160
Normal:
All clients under this port will be authorized when one of the client
do 802.1X authentication successfully.
Advanced:
Each clients under this port have to do 802.1X authentication by
himself.
Clientless:
The clients don’t need to install 802.1X client function, that means
the client PC (for example WINDOW XP) does not need to enable
802.1X client function also can do 802.1X authentication. But the
network maintainer need to configure the Radius server using each
client’s MAC address for Radius account ID and password.
Port Control:
This is used to set the operation mode of authorization. There are three
type of operation mode supported, ForceUnauthorized, ForceAuthorized,
Auto.
y
ForceUnauthorized:
The controlled port is forced to hold in the unauthorized state.
y
ForceAuthorized:
The controlled port is forced to hold in the authorized state.
y
Auto:
The controlled port is set to be in authorized state or unauthorized
state depends on the result of the authentication exchange between
the authentication server and the supplicant.
Default:
Auto
reAuthMax(1-10):
The number of authentication attempt that is permitted before the port
becomes unauthorized.
Default:
2
txPeriod(1-65535 s):
A time period to transmitted EAPOL PDU between the authenticator and
the supplicant.
Default:
30
Quiet Period(0-65535 s):
A period of time during which we will not attempt to access the supplicant.
Deafult:
60 seconds
reAuthEnabled:
Choose whether regular authentication will take place in this port.
Default:
ON
Summary of Contents for KGS-2416
Page 2: ......
Page 4: ......
Page 34: ...30 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection ...
Page 93: ...89 Fig 3 39 Fig 3 40 Fig 3 41 ...
Page 109: ...105 Fig 3 62 Set up VLAN Tag Priority Mapping Finish ...
Page 116: ...112 Fig 3 67 Ingress Port Fig 3 68 ...
Page 118: ...114 Fig 3 71 Fig 3 72 Fig 3 73 ARP ...
Page 119: ...115 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP ...
Page 120: ...116 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP ...
Page 121: ...117 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP ...
Page 122: ...118 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4 ...
Page 123: ...119 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4 ...
Page 124: ...120 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4 ...
Page 125: ...121 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4 ...
Page 126: ...122 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4 ...
Page 127: ...123 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4 ...
Page 128: ...124 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4 ...
Page 129: ...125 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4 ...
Page 130: ...126 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action ...
Page 131: ...127 Fig 3 118 Rate Limiter Fig 3 119 Port Copy ...
Page 132: ...128 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter ...
Page 144: ...140 Fig 3 124 Wizard Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules ...
Page 146: ...142 Fig 3 130 Set up Port Policies Fig 3 131 Set up Port Policies ...
Page 147: ...143 Fig 3 132 Set up Port Policies Finish Fig 3 133 Set up Typical Network Application Rules ...
Page 222: ...218 Fig 4 1 Fig 4 2 ...