Chapter 3 Using the console interface 183
Using the Business Policy Switch 2000 Version 1.2
EAPOL Security Configuration screen
The EAPOL Security Configuration screen (Figure65) allows you to selectively
limit access to the switch based on an authentication mechanism that uses
Extensible Authentication Protocol (EAP) to exchange authentication information
between the switch and an authentication server.
You will also need to set up specific user accounts on your RADIUS server:
User names
Passwords
VLAN IDs
Port priority
You can set up these parameters directly on your RADIUS server. For detailed
instructions about configuring your RADIUS server, refer to your RADIUS server
documentation.
Allowed Source Allows you to specify the ports that each MAC address is allowed to access.
The options for the Allowed Source field include a single unit/port number or a
port list value that you have previously configured in the MAC Address
Security Port Lists screen.
Default - (Blank field)
Range A single unit/port or a port list value (for example, 1/3, 1/6,
3/4, S1, S5, etc.).
1 Multicast address -- Note that the first octet of any multicast address will always be an odd number.
Note: Before you use the EAPOL Security Configuration screen, you
must configure your Primary RADIUS Server and RADIUS Shared
Secret.
Note: Do not enable EAPOL security on the switch port that is
connected to the RADIUS server.
Tabl e 20 MAC Address Security Table Screen Fields (continued)
Field Description