TEG1210P 10-Port Gigabit Intelligent PoE Switch User Guide
Leave packets to inform the multicast router that they have left a certain multicast group.
¾
802.1x
As an authentication protocol, 802.1X provides methods and policies for authenticating
users. It is a port based authentication policy that requires 802.1x-supported switches
and PCs to use EAPOL. 802.1x EAPOL is a layer-2 protocol. If a switch’s ports are
configured with 802.1x, then these ports will first be in unauthenticated state when
devices are detected on them. At this time, users’ PCs can only use EAPOL to
communicate with the switch. They need to be installed with an application program that
supports 802.1x (such as Windows that supports 802.1x), so the ports will start
forwarding data traffic as soon as users pass the authentication. The switch’s ports return
to unauthenticated state upon user’s logout; or when there is no traffic after a long time
elapses, the authentication will be ended due to timeout. In this case, the user is required
of re-authentication.
4.2 Appendix 2: How to Set TCP/IP (Windows XP is used as an
example)
This chapter instructs you how to configure TCP/ IP protocol under Windows XP. The
procedures are outlined as below.
1. Click “Start”
→
“Control Panel” to enter the control panel.
Figure 1
- 52 -