Versionen im Vergleich

Schlüssel

  • Diese Zeile wurde hinzugefügt.
  • Diese Zeile wurde entfernt.
  • Formatierung wurde geändert.

...

Configuring MAC authentication as a fallback for the authentication modes “Single 802.1X” or “Multi 802.1X” on a switch of the GS-23xx series switch:

1) Enabling MAC-based fallback:

...

1.2) Select the option MAC-based Fallback Enabled for the port on which where the authentication mode Single 802.1X or Multi 802.1X is enabled (under Admin State). Then click Apply.

...

  • Mode: For the appropriate port, select the option Enabled.
  • Limit: You can optionally adjust the Limit on the number of network users allowed to communicate via this port (maximum 1024 network users).
  • Action: Optionally select an Action that takes effect when the Limit is exceeded. UsuallyIn general, communication is prevented for all network users over the limit.
    • None (default setting):
      When the limit is exceeded, no further action is taken.
    • Trap:
    • When the limit is exceeded, an SNMP trap is sent. With Aging deactivated, the SNMP trap is only sent when the limit is exceeded for the first time. With Aging activated, an SNMP trap is sent every time the limit is exceeded.
    • Shutdown:
      When the limit is exceeded, the port is shut down and no further communication is possible. Communication is enabled again by clicking the button Reopen.
    • Trap & Shutdown:
      When the limit is exceeded, the port is shut down and the actions described under Trap and Shutdown are executed.

...

Configuring MAC authentication as a fallback for the authentication modes “Single 802.1X” or “Multi 802.1X” on a switch of the GS-3xxx series switch:

1) Enabling the feature “MAC-based fallback”:

1.1) Connect to the web interface webinterface of the Gs-3xxx switch and navigate to the menu Security → 802.1X → Configuration.

...

1.2) Select the option MAC-based Fallback Enabled for the port on which where the authentication mode Single 802.1X or Multi 802.1X is enabled (under Admin State). Then click Apply.

...

  • MAC Address: Show the MAC address of a device connected to this port.
  • VLAN ID: Shows the VLAN ID assigned to this port.
  • State: Shows whether the device is allowed to communicate via the port (Forwarding) or whether this it is blocked (Violating).
  • Time of Addition: Shows date and time when the device was first detected on that port.
  • Age/Hold: Show the permitted runtime for the connected device in seconds. If no packets are detected after this time elapses, the MAC address is deleted from the table. Otherwise, a new authentication takes place and the runtime starts again. Devices with the status Violating have no expiry time.

...