Configuring with Web Based Management
5.6 The "Security" menu
SCALANCE XB-200 Web Based Management
180 Configuration Manual, 04/2015, C79000-G8976-C360-02
Description of the displayed boxes
Table 1 has the following columns:
●
Select the required setting.
If "No Change" is selected, the entry in table 2 remains unchanged.
●
Select the required setting.
If "No Change" is selected, the entry in table 2 remains unchanged.
●
If you click the button, the settings are adopted for all ports of table 2.
Table 2 has the following columns:
●
This column lists all the ports available on this device.
●
Specify the authentication of the port:
– Force Unauthorized
Data traffic via the port is blocked.
– Force Authorized
Data traffic via the port is allowed without any restrictions.
Default setting
– Auto
End devices are authenticated on the port with the "802.1x" method.
The data traffic via the port is permitted or blocked depending on the authentication
result.
●
Enable this option if you want reauthentication of an already authenticated end device to
be repeated cyclically.
●
Shows the status of the authentication of the port:
– Unauthorized
– Authorized