EasyManua.ls Logo

Check Point UTM-1 Edge - Adding and Editing Bridges

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Managing Ports
214 Check Point UTM-1 Edge User Guide
This field… Displays…
802.1x The port's security scheme. This can be any of the following:
N/A. No security scheme is defined for the port.
Unauthorized. An 802.1x security scheme is defined for the
port. Users have not yet connected to the port and attempted
to authenticate, or a user failed to authenticate and no
Quarantine network is configured.
Authorized (network). An 802.1x security scheme is defined for
the port. A user connected to the port, authenticated
successfully, and was assigned to a network. The name of the
assigned network appears in parentheses.
Quarantine (network). An 802.1x security scheme is defined for
the port. A user connected to the port, failed to authenticate,
and was assigned to the Quarantine network. The name of
the Quarantine network appears in parentheses.
For information on configuring 802.1x port-based security, see Using
Port-Based Security on page
347.
Modifying Port Assignments
You can assign ports to different networks or purposes. Since modifying port assignments
often requires additional configurations, use the following table to determine which
procedure you should use.
Table 40: Modifying Port Assignments
To assign a port to... See...
No network The procedure below. This disables the port.
LAN The procedure below

Table of Contents

Related product manuals