Dell PowerConnect 6248 User's Guide - Page 288
Configuring Network Security, Dot1x Authentication - configure for voip
View all Dell PowerConnect 6248 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 288 highlights
Configuring Network Security Use the Network Security menu page to set network security through port-based authentication, locked ports, DHCP Filtering configuration, and access control lists. To display the Network Security page, click Switching →Network Security in the tree view. The Network Security menu page contains links to the following features: • Dot1x Authentication • Authenticated Users • Port Security • IP ACL Configuration • MAC ACL Configuration • IPv6 Access Control Lists • ACL Bind Configuration Dot1x Authentication IEEE 802.1X port-based network access control configuration is performed on the Dot1x Authentication page. MAC-based authentication allows multiple supplicants connected to the same port to each authenticate individually. For example, a system attached to the port might be required to authenticate in order to gain access to the network, while a VoIP phone might not need to authenticate in order to send voice traffic through the port. The 802.1X network has three components: • Authenticators - Specifies the port that is authenticated before permitting system access. • Supplicants - Specifies host connected to the authenticated port requesting access to the system services. • Authentication Server - Specifies the external server, for example, the RADIUS server that performs the authentication on behalf of the authenticator, and indicates whether the user is authorized to access system services. Use the Dot1x Authentication page to configure the 802.1X administrative mode on the switch and to configure general 802.1X parameters for a port. To display the Dot1x Authentication page, click Switching →Network Security →Dot1x Authentication in the tree view. 288 Configuring Switching Information