User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Managing Ports
Chapter 6: Managing Your Network 211
This field… Displays…
802.1x The port's security scheme. This can be any of the following:
Scheme Description
N/A
No security scheme is defined for the port.
Unauthorized
An 802.1x security scheme is defined for the
port. Users have not yet connected to the
port and attempted to authenticate, or a user
failed to authenticate and no Quarantine
network is configured.
Authorized (network)
An 802.1x security scheme is defined for the
port. A user connected to the port,
authenticated successfully, and was
assigned to a network. The name of the
assigned network appears in parentheses.
Quarantine (network)
An 802.1x security scheme is defined for the
port. A user connected to the port, failed to
authenticate, and was assigned to the
Quarantine network. The name of the
Quarantine network appears in parentheses.
For information on configuring 802.1x port-based security, see Using
Port-Based Security on page 374.