- Table of Contents
-
- 06-Network
- 01-Scanner
- 02-VRF
- 03-Interface
- 04-Interface pairs
- 05-Interface collaboration
- 06-Security zones
- 07-VLAN
- 08-MAC
- 09-DNS
- 10-ARP
- 11-ND
- 12-Forwarding advanced settings
- 13-Routing table
- 14-Static routing
- 15-Policy-based routing
- 16-OSPF
- 17-RIP
- 18-HTTP
- 19-SSH
- 20-NTP
- 21-FTP
- 22-Telnet
- 23-MAC authentication
- 24-MAC address whitelist
- 25-MAC access silent MAC info
- 26-MAC access advanced settings
- 27-IP authentication
- 28-IPv4 whitelist
- 29-IPv6 whitelist
- Related Documents
-
Title | Size | Download |
---|---|---|
24-MAC address whitelist | 16.57 KB |
MAC address whitelist
Introduction
To allow trustworthy endpoints to access the network without MAC authentication, add them to the MAC address whitelist.
You can add trustworthy endpoints to the MAC address whitelist manually or from the EPS system by using its endpoint scanning feature. On the EPS system, you can configure authentication settings such as passwords for these endpoints as needed.
When a MAC address is added to the MAC address whitelist, the device automatically add a local user account for that MAC address.
Configure the MAC address whitelist
1. Click the Network tab.
2. In the navigation pane, select Security Access > MAC Access > MAC Address Whitelist.
3. Click Create.
4. Configure MAC address whitelist parameters.
Table 1 MAC address whitelist configuration items
Item |
Description |
MAC address |
MAC address of the whitelist user. |
Available services |
Services available for the user. By default, LAN access is selected. This item is not user configurable. |
Access interface |
Select the interface through which the user accesses the device. If you select an interface that is not the user access interface, the user will fail authentication. |
5. Click OK. The new MAC whitelist user will be displayed in the list on the MAC Address Whitelist page.