MAC allow list:Only devices with MAC addresses specified in this list will have access to this port. Up to 20 MAC addresses can be defined.
Sticky MAC allow list:The switch will dynamically learn the MAC addresses of devices connected to the port and place the address in the MAC Whitelist. The administrator can define the size of this list. When this list is full, all subsequent devices will be denied access to this port. It can take up to 5 minutes for the learned MAC to appear in dashboard.
User-defined access policy:Administrators may define a policy for authentication via 802.1x or MAB. Learn more about access policieshere.
MAC allow list:Only devices with MAC addresses specified in this list will have access to this port. Up to 20 MAC addresses can be defined.
Sticky MAC allow list:The switch will dynamically learn the MAC addresses of devices connected to the port and place the address in the MAC Whitelist. The administrator can define the size of this list. When this list is full, all subsequent devices will be denied access to this port. It can take up to 5 minutes for the learned MAC to appear in dashboard.
User-defined access policy:Administrators may define a policy for authentication via 802.1x or MAB. Learn more about access policieshere.
If you know the IP address the client will get (perhaps via a fixed DHCP reservation), you could create an ACL. You only need two entries - a deny for that IP address and the a permit any.
Not sure how well it would work but in theory you could create a group policy that blocks all traffic, then manually add the client with the Mac address and assign it the group policy.