Configuring 802.1x port authentication, Figure 199: configuring port security, Port authentication – LevelOne GTL-2691 User Manual
Page 382: 1x p
C
HAPTER
13
| Security Measures
Configuring 802.1X Port Authentication
– 382 –
The maximum address count is effective when port security is enabled
or disabled, but can only be set when Security Status is disabled.
◆
Current MAC Count – The number of MAC addresses currently
associated with this interface.
◆
MAC Filter – Shows if MAC address filtering has been set under
Security > Network Access (Configure MAC Filter) as described on
◆
Filter ID – The identifier for a MAC address filter.
◆
Last Intrusion MAC – The last unauthorized MAC address detected.
◆
Last Time Detected Intrusion MAC – The last time an unauthorized
MAC address was detected.
W
EB
I
NTERFACE
To configure port security:
1.
Click Security, Port Security.
2.
Mark the check box in the Security Status column to enable security,
set the action to take when an invalid address is detected on a port,
and set the maximum number of MAC addresses allowed on the port.
3.
Click Apply
Figure 199: Configuring Port Security
C
ONFIGURING
802.1X P
ORT
A
UTHENTICATION
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch