hit counter script

Configuring 802.1X - Cisco 220 Series Smart Plus Administration Manual

Hide thumbs Also See for 220 Series Smart Plus:
Table of Contents

Advertisement

Configuring Security
Configuring 802. 1 X
STEP 4

Configuring 802.1X

Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x
Action on Violation—If Interface Status is locked, select an action to be
applied to packets arriving on a locked interface. The options are:
Discard
-
—Discards packets from any unlearned source.
Forward
-
—Forwards packets from an unknown source without learning
the MAC address.
Discard and Log
-
down the interface, logs the events, and sends traps to the specified trap
receivers.
Shutdown
-
—Discards packets from any unlearned source, shuts down
the interface, logs the events, and sends traps to the specified trap
receivers. The interface remains shut down until reactivated, or until the
switch is rebooted.
Trap—Check Enable to enable traps when a packet is received on a locked
interface. This is relevant for lock violations.
Trap Frequency—Enter minimum time in seconds that elapses between
traps. The switch enables traps when a packet is received on a locked
interface. This is relevant for lock violations.
Click Apply. Port security is modified, and the Running Configuration is updated.
Port-based access control has the effect of creating two types of access on the
switch ports. One point of access enables uncontrolled communication,
regardless of the authorization state (uncontrolled port). The other point of access
authorizes communication between the host and the switch.
The 802. 1 X is an IEEE standard for port based network access control. The 802. 1 X
framework enables a device (the supplicant) to request port access from a remote
device (authenticator) to which it is connected. Only when the supplicant
requesting port access is authenticated and authorized is the supplicant
permitted to send data to the port. Otherwise, the authenticator discards the
supplicant data unless the data is sent to a Guest VLAN and/or non-authenticated
VLANs.
—Discards packets from any unlearned source, shuts
16
200

Advertisement

Table of Contents
loading

Table of Contents