C
HAPTER
13
| Security Measures
Configuring 802.1X Port Authentication
– 383 –
The maximum address count is effective when port security is enabled
or disabled.
◆ Current MAC Count – The number of MAC addresses currently
associated with this interface.
◆ MAC Filter – Shows if MAC address filtering has been set under
Security > Network Access (Configure MAC Filter) as described on
page 334.
◆ MAC Filter ID – The identifier for a MAC address filter.
◆ Last Intrusion MAC – The last unauthorized MAC address detected.
◆ Last Time Detected Intrusion MAC – The last time an unauthorized
MAC address was detected.
WEB INTERFACE
To configure port security:
1. Click Security, Port Security.
2. Mark the check box in the Security Status column to enable security,
set the action to take when an invalid address is detected on a port,
and set the maximum number of MAC addresses allowed on the port.
3. Click Apply
Figure 209: Configuring Port Security
CONFIGURING 802.1X PORT AUTHENTICATION
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch
ports in a network can be centrally controlled from a server, which means