82
6.26.3 802.1X/Radius
802.1x is an IEEE authentication specification which prevents the client from accessing
a wireless access point or wired switch until it provides authority, like the user name and
password that are verified by an authentication server (such as RADIUS server).
After enabling the IEEE 802.1X function, you can configure the parameters of this
function.
6.26.3.1 Configuration
IEEE 802.1x Protocol:
Enable or disable 802.1x protocol.
Radius Server IP:
Assign the RADIUS Server IP address.
Server Port:
Set the UDP destination port for authentication requests to the
specified RADIUS Server.
Accounting Port:
Set the UDP destination port for accounting requests to the
specified RADIUS Server.
Shared Key:
Set an encryption key for using during authentication sessions with
the specified RADIUS server. This key must match the encryption key used on the
RADIUS Server.
NAS, Identifier:
Set the identifier for the RADIUS client.
Quiet Period:
Set
the period which the port doesn’t try to acquire a supplicant.
TX Period:
Set the period the port waits for retransmit next EAPOL PDU during an
authentication session.
Supplicant Timeout:
Set the period of time the switch waits for a supplicant
response to an EAP request.
Server Timeout:
Set the period of time the switch waits for a server response to an
authentication request.
Max Requests:
Set the number of authentication that must time-out before
authentication fails and the authentication session ends.
Reauth period:
Set the period of time which clients connected must be re-
authenticated.
Click
Apply
.
Summary of Contents for 2204F Series
Page 23: ...16 LC connector to the transceiver ...
Page 31: ...24 ...
Page 37: ...30 IP Addressing interface ...
Page 40: ...33 SNMP Agent Configuration interface ...
Page 48: ...41 ...
Page 52: ...45 Port Statistics interfac ...
Page 59: ...52 6 17 2Aggregator Status You can check the setting of Port aggregation in Status ...
Page 64: ...57 RSTP Port Configuration interface ...
Page 67: ...60 field and click Delete to remove it ...
Page 75: ...68 6 24 2Switch Status You can see the status of VLAN setting in this function ...
Page 80: ...73 highest priority Click Apply to have the configuration take effect ...
Page 91: ...84 6 26 3 3 Port Status You can monitor the port Authorized state in this function ...
Page 92: ...85 6 26 4 MAC Filtering You can block the un authorized MAC by switch in this function ...
Page 93: ...86 6 26 5 Port Security You can block the un authorized MAC by oer port in this function ...
Page 102: ...95 Straight through cables schematic Cross over cables schematic ...