Netgear 7300S User Manual Page 213

  • Download
  • Add to my manuals
  • Print
  • Page
    / 402
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 212
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
Security Commands 9-5
202-10088-01, March 2005
show port-security violation
This command displays the source MAC address of the last packet that was discarded on a locked
port.
Format
show port-security violation <interface>
Mode Privileged EXEC
MAC Address MAC Address of discarded packet on locked port.
Port Based Network Access Control (IEEE 802.1X)
Commands
This section provides a detailed explanation of the 802.1x commands. The commands are divided
into the following groups:
Configuration commands are used to configure features and options of the switch. For every
configuration command there is a show command that will display the configuration setting.
Show commands are used to display switch settings, statistics and other information.
authentication login
This command creates an authentication login list. The <listname> is any character string and is
not case sensitive. Up to 10 authentication login lists can be configured on the switch. When a list
is created, the authentication method “local” is set as the first method.
When the optional parameters “Option1”, “Option2” and/or “Option3” are used, an ordered list of
methods are set in the authentication login list. If the authentication login list does not exist, a new
authentication login list is first created and then the authentication methods are set in the
authentication login list. The maximum number of authentication login methods is three. The
possible method values are
local, radius and reject.
The value of
local indicates that the users locally stored ID and password are used for
authentication. The value of
radius indicates that the user’s ID and password will be authenticated
using the RADIUS server. The value of
reject indicates the user is never authenticated.
To authenticate a user, the authentication methods in the users login will be attempted in order
until an authentication attempt succeeds or fails
.
Note: The default login list included with the default configuration can not be changed.
Page view 212
1 2 ... 208 209 210 211 212 213 214 215 216 217 218 ... 401 402

Comments to this Manuals

No comments