33
Chapter 4 - Configuration Management
ASUS GigaX 1024i+
4.5
Security
The switch has the 802.1x port-based security feature. Only authorized
hosts are allowed to access the switch port. Traffic is blocked for
unauthorized hosts. The authentication service is provided by a RADIUS
server or the local database in the switch.
The switch also supports dynamic VLAN assignment through the 802.1x
authentication process. The VLAN information for the users/ports should
be properly configured in the authentication server before enabling this
feature.
4.5.1 Port Access Control
Port Access Control
is used to
configure various 802.1x parameters.
802.1x uses either a RADIUS server
or a local database to authenticate
port users.
Port Access Control has two settings:
the Bridge (Global) settings and the
port settings.
Bridge (Global) settings
The Bridge (Global) settings page has the following configuration
parameters:
•
Reauthentication
: Once enabled, the switch will try to authenticate the
port user again when the reauthentication time is up.
•
Reauthentication Time
: If ‘Reauthentication’ is enabled, this is the
interval for the switch to re-send authentication request to the port user.
•
Authentication Method
: RADIUS or Local database can be used to
authenticate the port user.
•
Quiet Period
: If authentication failed either from the RADIUS or the local
database, the switch waits upon this time period before sending another
authentication request to the port user.
•
Retransmission Time
: If the port user failed to respond to authentication
request from the switch, the switch waits upon this time period before
sending another authentication request to the port user.
•
Max Reauthentication Attempts
: Retry count if the port user failed to
respond to authentication requests from the switch.
Figure 35. Port Access Control