Netgear FSM726v2 FSM726v2 Setup Manual - Page 35

Main Menu> Advanced > Trusted MAC Address Table, Main Menu > Advanced > MAC Address Lockdown Table

Page 35 highlights

700 Series Software Manual v2.1 Figure 4-20: Port-Based Authentication 802.1x port-based authentication provides RADIUS client authentication and data encryption features (see Appendix C, "802.1x Port-Based Authentication Overview"). If you have a RADIUS server on your network, you can have authentication of port access done through the RADIUS server. This does affect traffic passing through the switch, which can be helpful is securing your network from wireless eavesdropping when a wireless access point is connected to the switch. To enable 802.1x, provide the IP address of the RADIUS server, and the shared secret authentication key. The re-authentication timer determines how frequently the session will refresh the data encryption with a new key. Main Menu> Advanced > Trusted MAC Address Table This page shows all of the trusted MAC addresses you can set to allow the switch to forward traffic from. The maximum number of trusted MAC addresses is 128 per port and 1024 per system. Any traffic from MAC addresses that are not included in the trusted MAC address table will be dropped. There are three functions, which allow you to Add, Delete, or Query entries from the Trusted MAC Address Table. Main Menu > Advanced > MAC Address Lockdown Table This page shows all of the locked down MAC addresses that the switch has learned. To use the lockdown feature, you have to enable it first. After triggering the lockdown function, the maximum number of MAC addresses that a system can learn is 1024. As it reaches the maximun number of MAC addresses (either per port or per system), the switch will lock down address learning for that saturated port or the whole system. If an individual port has locked down, it will not accept any new MAC addresses until you remove some MAC addresses from the table. Administration Console Telnet Interface 4-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156

700 Series Software Manual v2.1
Administration Console Telnet Interface
4-17
Figure 4-20:
Port-Based Authentication
802.1x port-based authentication provides RADIUS client authentication and data encryption
features (see
Appendix C, “802.1x Port-Based Authentication Overview”
). If you have a RADIUS
server on your network, you can have authentication of port access done through the RADIUS
server. This does affect traffic passing through the switch, which can be helpful is securing your
network from wireless eavesdropping when a wireless access point is connected to the switch. To
enable 802.1x, provide the IP address of the RADIUS server, and the shared secret authentication
key. The re-authentication timer determines how frequently the session will refresh the data
encryption with a new key.
Main Menu> Advanced > Trusted MAC Address Table
This page shows all of the trusted MAC addresses you can set to allow the switch to forward traffic
from. The maximum number of trusted MAC addresses is 128 per port and 1024 per system. Any
traffic from MAC addresses that are not included in the trusted MAC address table will be
dropped. There are three functions, which allow you to Add, Delete, or Query entries from the
Trusted MAC Address Table.
Main Menu > Advanced > MAC Address Lockdown Table
This page shows all of the locked down MAC addresses that the switch has learned. To use the
lockdown feature, you have to enable it first. After triggering the lockdown function, the
maximum number of MAC addresses that a system can learn is 1024. As it reaches the maximun
number of MAC addresses (either per port or per system), the switch will lock down address
learning for that saturated port or the whole system. If an individual port has locked down, it will
not accept any new MAC addresses until you remove some MAC addresses from the table.