Dell PowerConnect 5324 User's Guide - Page 197
Configuring Device Information, Configuring Network Security, Network Security Overview
View all Dell PowerConnect 5324 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 197 highlights
Configuring Device Information This section provides all system operation and general information for configuring network security, ports, Address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support. Configuring Network Security The device enables network security through both Access Control Lists and Locked Ports. To open the Network Security page select Switch →Network Security. Network Security Overview This section describes the network security features. Port Based Authentication (802.1x) Port based authentication enables authenticating system users on a per-port basis via a external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port Authentication includes: • Authenticators - Specifies the port that is authenticated before permitting system access. • Supplicants - Specifies host connected to the authenticated port requesting to access the system services. • Authentication Server - Specifies the external server, for example, the RADIUS server that performs the authentication on behalf of the authenticator, and indicates whether the user is authorized to access system services. Port based authentication creates two access states: • Controlled Access - Permits communication between the user and the system, if the user is authorized. • Uncontrolled Access - Permits uncontrolled communication regardless of the port state. Configuring Device Information 197