Configuring Device Information 2157Configuring Device InformationThis section provides all system operation and general information for configuring network security,ports, Address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support.Configuring Network SecurityThe device enables network security through both Access Control Lists and Locked Ports. To open theNetwork Security page select Switch → Network Security.Network Security OverviewThis section describes the network security features.Port Based Authentication (802.1x)Port based authentication enables authenticating system users on a per-port basis via a external server.Only authenticated and approved system users can transmit and receive data. Ports are authenticated viathe RADIUS server using the Extensible Authentication Protocol (EAP). Port Authentication includes:• Authenticators — Specifies the port that is authenticated before permitting system access.• Supplicants — Specifies host connected to the authenticated port requesting to access the systemservices.• Authentication Server — Specifies the external server, for example, the RADIUS server thatperforms the authentication on behalf of the authenticator, and indicates whether the user isauthorized to access system services.Port based authentication creates two access states:• Controlled Access — Permits communication between the user and the system, if the user isauthorized.• Uncontrolled Access — Permits uncontrolled communication regardless of the port state.The device currently supports Port Based Authentication via RADIUS servers.Advanced Port Based AuthenticationAdvanced Port Based Authentication enables multiple hosts to be attached to a single port. AdvancedPort Based Authentication requires only one host to be authorized for all hosts to have system access. Ifthe port is unauthorized all attached hosts are denied access to the network.