![](/images/new-backgrounds/1108453/10845381x1.webp)
Chapter 5 | Advanced Configuration |
Security > 802.1x Settings
Security > 802.1x Settings
Port based authentication enables authenticating system users on a
Enable 802.1x Place a checkmark in the check box to enable 802.1x authentication.
Port Indicates the port name.
Status Port Control Specifies the port authorization state. The possible field values are as follows:
••
••
Enable Periodic Reauthentication Permits immediate port reauthentication.
Setting Timer The Setting Timer button opens the Setting Timer screen to configure ports for 802.1x functionality.
Setting Timer
802.1x Settings > Setting Timer
Port Indicates the port name.
Reauthentication Period Specifies the number of seconds in which the selected port is reauthenticated (Range:
Quiet Period Specifies the number of seconds that the switch remains in the quiet state following a failed authentication exchange (Range:
Resending EAP Specifies the number of seconds that the switch waits for a response to an EAP - request/identity frame, from the supplicant (client), before resending the request.
Max EAP Requests The total amount of EAP requests sent. If a response is not received after the defined period, the authentication process is restarted. The field default is 2 retries.
SupplicantTimeout Displays the number of seconds that lapses before EAP requests are resent to the supplicant (Range:
Server Timeout Specifies the number of seconds that lapses before the switch resends a request to the authentication server (Range:
Security > Ports Security
Security > Ports Security
Network security can be increased by limiting access on a specific port only to users with specific MAC addresses. MAC addresses can be dynamically learned or statically configured. Locked port security monitors both received and learned packets that are received on specific ports. Access to the locked port is limited to users with specific MAC addresses. These addresses are either manually defined on the port, or learned on that port up to the point when it is locked. When a packet is received on a locked port, and the packet source MAC address is not tied
35 |