User Manual

Table Of Contents
Managing Device Security
427
M6100 Web Management User Guide
subsequent rules below that are ignored. For example, if a Source IP 10.10.10.10 is
configured with priority 1 to permit, and Source IP 10.10.10.10 is configured with priority 2 to
Deny, then access is permitted if the profile is active, and the second rule is ignored.
6. Click Add to add a new access rule. Make sure that the access profile is created before
adding the rules.
7. Click Apply to send the updated configuration to the switch. Configuration changes take
effect immediately.
8. Changes can be applied to the access rule only when the access profile is in deactive state.
9. Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
10. Click Delete to delete the selected access rule.
Note: If the access profile is active, then the access rule cannot be deleted.
Make sure that the access profile is in deactive state before removing
the access rule.
Port Authentication
In port-based authentication, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use
the port without restrictions. At any given time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This
is the default authentication mode.
The 802.1X network has three components:
Authenticators - Specifies the port that is authenticated before permitting system
access.
Supplicants - Specifies the host connected to the authenticated port requesting access
to the system services.
Authentication Server - Specifies the external server, for example, the RADIUS server
that performs the authentication on behalf of the authenticator, and indicates whether the
user is authorized to access system services.
From the Port Authentication page, you can access the following pages:
Basic on page 427
Advanced on page 429
Basic
From the Basic link, you can access the following pages:
802.1X Configuration on page 428