Configuring 802.1x and port-based security, Port-based security overview, Configuring 802.1x and port-based – Dell POWEREDGE M1000E User Manual

Page 509: Security, Configuring, See "configuring 802.1x, Ee "configuring 802.1x, Configuring 802.1x and port-based security" on

Advertising
background image

Configuring 802.1X and Port-Based Security

509

19

Configuring 802.1X and Port-Based

Security

This chapter describes how to configure port-based security features

including IEEE 802.1X authentication and port security. Port-based security

can also be accomplished by using Access Control Lists (ACLs). For

information about configuring ACLs, see "Configuring Access Control Lists"

on page 543.
The topics covered in this chapter include:

Port-Based Security Overview
Default Port-Based Security Values
Configuring Port-Based Security (Web)
Configuring Port-Based Security (CLI)
Port-Based Security Configuration Examples

Port-Based Security Overview

Port-based security controls access to the network through the switch ports.

Network access is permitted only to authorized devices (clients). This chapter

describes IEEE 802.1X, which provides an authentication mechanism to

devices connected to the switch and Port Security, which allows a

configurable limit to the number of source MAC addresses that can be

learned on a port.

Advertising