User's Guide
Page 97
... server. - Contains an interface list. • User Name - Enables port-based authentication on the authentication exchange between the device and the client. - The device cannot provide authentication services to 802.1x based authentication and MAC based authentication. • Dynamic VLAN Assignment - MAC Only - Sets the authentication type to the client through the interface. • Current Interface Control - RADIUS...
... server. - Contains an interface list. • User Name - Enables port-based authentication on the authentication exchange between the device and the client. - The device cannot provide authentication services to 802.1x based authentication and MAC based authentication. • Dynamic VLAN Assignment - MAC Only - Sets the authentication type to the client through the interface. • Current Interface Control - RADIUS...
User's Guide
Page 100
... Session - Forward - Multiple Host - The Action on Single Host Violation - Defines the host authentication type. Enables a single host to authorize multiple hosts for which Advanced Port Based Authentication is reset. • Traps - Forwards the packets from a host whose MAC address is defined as Disable. Shutdown - Discards the packet from any unlearned source and...
... Session - Forward - Multiple Host - The Action on Single Host Violation - Defines the host authentication type. Enables a single host to authorize multiple hosts for which Advanced Port Based Authentication is reset. • Traps - Forwards the packets from a host whose MAC address is defined as Disable. Shutdown - Discards the packet from any unlearned source and...
User's Guide
Page 102
.... • Port - None - The user was authenticated. The Authenticated Users Table opens: Figure 7-6. To open the Authenticated Users page, click Switch → Network Security → Authenticated Users. Authenticated Users Table 102 Update with your book title Authenticating Users The Authenticated Users page displays user port access lists. The client (supplicant) MAC address. Authenticated Users • User Name - The method...
.... • Port - None - The user was authenticated. The Authenticated Users Table opens: Figure 7-6. To open the Authenticated Users page, click Switch → Network Security → Authenticated Users. Authenticated Users Table 102 Update with your book title Authenticating Users The Authenticated Users page displays user port access lists. The client (supplicant) MAC address. Authenticated Users • User Name - The method...
User's Guide
Page 178
... is recorded. MD5 verifies the integrity of the communication, authenticates the origin of the Data Link Control (DTL) layer. A cable used for hubs and switches. M MAC Address Media Access Control Address. MAC Layer A sub-layer of the communication. MIBs contain information... that address are considered the same age. MAC Address Learning minimizes traffic on which the packet's source MAC address is located. MDI Media Dependent Interface. Mask A filter that identifies each network node. MAC Address Learning MAC Address Learning characterizes a learning bridge, in fifth...
... is recorded. MD5 verifies the integrity of the communication, authenticates the origin of the Data Link Control (DTL) layer. A cable used for hubs and switches. M MAC Address Media Access Control Address. MAC Layer A sub-layer of the communication. MIBs contain information... that address are considered the same age. MAC Address Learning minimizes traffic on which the packet's source MAC address is located. MDI Media Dependent Interface. Mask A filter that identifies each network node. MAC Address Learning MAC Address Learning characterizes a learning bridge, in fifth...
User's Guide
Page 184
... IP, 177 IPM, 177 IPX, 177 ISIS, 177 J Jumbo frames, 177 L L2TP, 177 LAG, 106, 177 LAGs, 138 Local User Database, 69 Loops, 116 M MAC Address, 178 MAC address, 114 Management Information Base., 178 Management security, 69 Master Election/Topology Discovery Algorithm, 178 MD5, 178 MDI, 12, 104, 178 MDI/MDIX, 36... PVID, 130, 132 Q QoS, 150, 179 Quality of Service, 147, 179 Queue, 151 R RADIUS, 71-73, 179 Rapid Spanning Tree Protocol, 180 RDP, 179 Remote Authentication Dial-
... IP, 177 IPM, 177 IPX, 177 ISIS, 177 J Jumbo frames, 177 L L2TP, 177 LAG, 106, 177 LAGs, 138 Local User Database, 69 Loops, 116 M MAC Address, 178 MAC address, 114 Management Information Base., 178 Management security, 69 Master Election/Topology Discovery Algorithm, 178 MD5, 178 MDI, 12, 104, 178 MDI/MDIX, 36... PVID, 130, 132 Q QoS, 150, 179 Quality of Service, 147, 179 Queue, 151 R RADIUS, 71-73, 179 Rapid Spanning Tree Protocol, 180 RDP, 179 Remote Authentication Dial-