ECS4110-28P_Management Guide

Table Of Contents
C
HAPTER
13
| Security Measures
Network Access (MAC Address Authentication)
– 331 –
4. Mark the check box for any host addresses that need to be re-
authenticated, and click Re-authenticate.
Figure 170: Configuring Interface Settings for Web Authentication
NETWORK ACCESS (MAC ADDRESS AUTHENTICATION)
Some devices connected to switch ports may not be able to support 802.1X
authentication due to hardware or software limitations. This is often true
for devices such as network printers, IP phones, and some wireless access
points. The switch enables network access from these devices to be
controlled by authenticating device MAC addresses with a central RADIUS
server.
N
OTE
:
RADIUS authentication must be activated and configured properly
for the MAC Address authentication feature to work properly. (See
"Configuring Remote Logon Authentication Servers" on page 312.)
N
OTE
:
MAC authentication cannot be configured on trunk ports.
CLI REFERENCES
"Network Access (MAC Address Authentication)" on page 895
COMMAND USAGE
MAC address authentication controls access to the network by
authenticating the MAC address of each host that attempts to connect
to a switch port. Traffic received from a specific MAC address is
forwarded by the switch only if the source MAC address is successfully
authenticated by a central RADIUS server. While authentication for a
MAC address is in progress, all traffic is blocked until authentication is
completed. On successful authentication, the RADIUS server may
optionally assign VLAN and quality of service settings for the switch
port.
When enabled on a port, the authentication process sends a Password
Authentication Protocol (PAP) request to a configured RADIUS server.
The user name and password are both equal to the MAC address being