
Configuring Device Security
Configuring Network Security
Page 73
The Port Authentication Settings Page contains the following port authentication parameters:
• Port — Displays a list of interfaces on which port-based authentication is enabled.
• User Name — Displays the supplicant user name.
• Admin Port Control — Indicates the port state. The possible field values are:
• Admin Port Control — Indicates the port state. The possible field values are:
– Auto —Enables port-based authentication on the device. The interface moves between an authorized or
unauthorized state based on the authentication exchange between the device and the client.
– ForceAuthorized — Indicates the interface is in an authorized state without being authenticated. The
interface re-sends and receives normal traffic without client port-based authentication.
– ForceUnauthorized — Denies the selected interface system access by moving the interface into
unauthorized state. The device cannot provide authentication services to the client through the interface.
• Current Port Control — Displays the current port authorization state. The possible field values are:
– Authorized — Indicates the interface is in an authorized state.
– Unauthorized — Denies the selected interface system access.
• Action on Violation — Indicates the intruder action defined for the port. Indicates the action to be applied to
packets arriving on a locked port. The possible values are: The possible field values are:
– Forward — Enables the forwarding of frames with source addresses that are not the supplicant’s
address, while not learning the source addresses.
– Discard — Enables the discarding of frames with source addresses that are not the supplicant’s
address. This is the default value.
– Shutdown — The port is shut down and enables the discarding of frames with source addresses that are
not the supplicant’s address.
• Violation Notification — Indicates if the SNMP trap generated if there is a violation. The possible field
values are:
– Enable — A notification is sent.
– Disable — A notification is not sent.
• Violation Notification Frequency — Enter the frequency to send notifications.
• Enable Guest VLAN — Indicates if the Guest VLAN is enabled. The possible field values are:
– Checked — Enables the Guest VLAN.
– Unchecked — Disables the Guest VLAN. This is the default value.
• Authentication Method — Defines the user authentication methods. MAC authentication ensures that end-
user stations meet security policies criteria, and protects networks from viruses. The possible values are:
– 802.1X Only – Enables only 802.1X authentication on the device.
– MAC Only — Enables only MAC authentication on the device.
– MAC + 802.1X – Enables MAC Authentication + 802.1X authentication on the device. In case of MAC+
802.1x, 802.1x takes precedence.
• Enable Dynamic VLAN Assignment — Enables automatically assigning users to VLANs during RADIUS
server authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to
the VLAN that is defined in the RADIUS server. The VLANs that cannot participate in DVA are:
– An Unauthenticated VLAN.
– A Dynamic VLAN that was created by GVRP.
– A Voice VLAN.
– A Default VLAN
– A Guest VLAN:
Kommentare zu diesen Handbüchern