beautypg.com

Configuring authenticator parameters – Allied Telesis AT-S60 User Manual

Page 561

background image

AT-S60 Management Software User’s Guide

Section V: Security Features

561

Configuring Authenticator Parameters

After you have enabled port-based access control and configured a port
as an authenticator, use this procedure to configure the authenticator
parameters. The procedure in Setting the Port Access Role on page 559
describes how to configure a port as an authenticator. For information
about the role of an authenticator, see the 802.1x Port-based Access
Network Control Overview on page 550.

To display the authenticator parameters, see Displaying Authenticator
Ports on page 573.

Note

When you configure a port as an authenticator or supplicant, the
port’s security level is automatically changed to PA (Port Access).
The Port Access value cannot be changed as long as the port is
functioning as an authenticator or supplicant. For more information
about port security, see Port Security Overview on page 470.

To configure authenticator parameters, perform the following
procedure:

1. From the Main Menu, type 6 to select Security Menu.

The Security Menu is shown in Figure 151 on page 473.

2. From the Security Menu, select Port Access Control.

The Port Access Control Menu is shown in Figure 180 on page 557.