Dot1x authentication (ieee 802.1x), Mac-based 802.1x authentication, Dot1x monitor mode – Dell POWEREDGE M1000E User Manual

Page 63: Mac-based port security

Advertising
background image

Switch Features

63

Dot1x Authentication (IEEE 802.1X)

Dot1x authentication enables the authentication of system users through a

local internal server or an external server. Only authenticated and approved

system users can transmit and receive data. Supplicants are authenticated

using the Extensible Authentication Protocol (EAP). Also supported are

PEAP, EAP-TTL, EAP-TTLS, and EAP-TLS.
For information about configuring IEEE 802.1X settings, see "Configuring

802.1X and Port-Based Security" on page 509.

MAC-Based 802.1X Authentication

MAC-based authentication allows multiple supplicants connected to the

same port to each authenticate individually. For example, a system attached

to the port might be required to authenticate in order to gain access to the

network, while a VoIP phone might not need to authenticate in order to send

voice traffic through the port.
For information about configuring MAC-based 802.1X authentication, see

"Configuring 802.1X and Port-Based Security" on page 509.

Dot1x Monitor Mode

Monitor mode can be enabled in conjunction with Dot1x authentication to

allow network access even when the user fails to authenticate. The switch logs

the results of the authentication process for diagnostic purposes. The main

purpose of this mode is to help troubleshoot the configuration of a Dot1x

authentication on the switch without affecting the network access to the

users of the switch.
For information about enabling the Dot1X Monitor mode, see "Configuring

802.1X and Port-Based Security" on page 509.

MAC-Based Port Security

The port security feature limits access on a port to users with specific MAC

addresses. These addresses are manually defined or learned on that port.

When a frame is seen on a locked port, and the frame source MAC address is

not tied to that port, the protection mechanism is invoked.
For information about configuring MAC-based port security, see

""Configuring 802.1X and Port-Based Security" on page 509.

Advertising