Configuring 802.1x and port-based security, Port-based security overview, Configuring 802.1x and port-based – Dell POWEREDGE M1000E User Manual
Page 509: Security, Configuring, See "configuring 802.1x, Ee "configuring 802.1x, Configuring 802.1x and port-based security" on

Configuring 802.1X and Port-Based Security
509
19
Configuring 802.1X and Port-Based
Security
This chapter describes how to configure port-based security features
including IEEE 802.1X authentication and port security. Port-based security
can also be accomplished by using Access Control Lists (ACLs). For
information about configuring ACLs, see "Configuring Access Control Lists"
on page 543.
The topics covered in this chapter include:
• Port-Based Security Overview
• Default Port-Based Security Values
• Configuring Port-Based Security (Web)
• Configuring Port-Based Security (CLI)
• Port-Based Security Configuration Examples
Port-Based Security Overview
Port-based security controls access to the network through the switch ports.
Network access is permitted only to authorized devices (clients). This chapter
describes IEEE 802.1X, which provides an authentication mechanism to
devices connected to the switch and Port Security, which allows a
configurable limit to the number of source MAC addresses that can be
learned on a port.