Allied Telesis AT-S94 Betriebsanweisung Seite 73

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 254
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 72
Configuring Device Security
Configuring Network Security
Page 73
The Port Authentication Settings Page contains the following port authentication parameters:
Port — Displays a list of interfaces on which port-based authentication is enabled.
User Name — Displays the supplicant user name.
Admin Port Control — Indicates the port state. The possible field values are:
Admin Port Control — Indicates the port state. The possible field values are:
Auto —Enables port-based authentication on the device. The interface moves between an authorized or
unauthorized state based on the authentication exchange between the device and the client.
ForceAuthorized — Indicates the interface is in an authorized state without being authenticated. The
interface re-sends and receives normal traffic without client port-based authentication.
ForceUnauthorized — Denies the selected interface system access by moving the interface into
unauthorized state. The device cannot provide authentication services to the client through the interface.
Current Port Control — Displays the current port authorization state. The possible field values are:
Authorized — Indicates the interface is in an authorized state.
Unauthorized — Denies the selected interface system access.
Action on Violation — Indicates the intruder action defined for the port. Indicates the action to be applied to
packets arriving on a locked port. The possible values are: The possible field values are:
Forward — Enables the forwarding of frames with source addresses that are not the supplicant’s
address, while not learning the source addresses.
Discard — Enables the discarding of frames with source addresses that are not the supplicant’s
address. This is the default value.
Shutdown — The port is shut down and enables the discarding of frames with source addresses that are
not the supplicant’s address.
Violation Notification — Indicates if the SNMP trap generated if there is a violation. The possible field
values are:
Enable — A notification is sent.
DisableA notification is not sent.
Violation Notification Frequency — Enter the frequency to send notifications.
Enable Guest VLAN — Indicates if the Guest VLAN is enabled. The possible field values are:
Checked — Enables the Guest VLAN.
Unchecked — Disables the Guest VLAN. This is the default value.
Authentication Method — Defines the user authentication methods. MAC authentication ensures that end-
user stations meet security policies criteria, and protects networks from viruses. The possible values are:
802.1X Only – Enables only 802.1X authentication on the device.
MAC Only — Enables only MAC authentication on the device.
MAC + 802.1X – Enables MAC Authentication + 802.1X authentication on the device. In case of MAC+
802.1x, 802.1x takes precedence.
Enable Dynamic VLAN Assignment — Enables automatically assigning users to VLANs during RADIUS
server authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to
the VLAN that is defined in the RADIUS server. The VLANs that cannot participate in DVA are:
An Unauthenticated VLAN.
A Dynamic VLAN that was created by GVRP.
A Voice VLAN.
A Default VLAN
A Guest VLAN:
Seitenansicht 72
1 2 ... 68 69 70 71 72 73 74 75 76 77 78 ... 253 254

Kommentare zu diesen Handbüchern

Keine Kommentare