manualshive.com logo in svg
background image

Chapter 

Advanced Configuration

20

24-Port 10/100 + 2-Port 10/100/1000 Gigabit Advanced Smart Switch with 2 Combo SFPs

Security > 802.1X Settings

Security > 802.1X Settings

Network  switches  can  provide  open  and  easy  access 
to  network  resources  by  simply  attaching  a  client  PC. 
Although  this  automatic  configuration  and  access  is  a 
desirable  feature,  it  also  allows  unauthorized  personnel 
to  easily  intrude  and  possibly  gain  access  to  sensitive 
network data.

The  IEEE  802.1X  (dot1X)  standard  defines  a  port-based 
access  control  procedure  that  prevents  unauthorized 
access  to  a  network  by  requiring  users  to  first  submit 
credentials for authentication. Access to all switch ports in 
a network can be centrally controlled from a server, which 
means that authorized users can use the same credentials 
for authentication from any point within the network.

This  Switch  uses  the  Extensible  Authentication  Protocol 
over LANs (EAPOL) to exchange authentication protocol 
messages  with  the  client,  and  a  remote  RADIUS 
authentication  server  to  verify  user  identity  and  access 
rights. When a client connects to a switch port, the Switch 
responds  with  an  EAPOL  identity  request.  The  client 
provides  its  identity  (such  as  a  user  name)  in  an  EAPOL 
response to the Switch, which it forwards to the RADIUS 
server. The RADIUS server verifies the client identity and 
sends an access challenge back to the client. The EAP packet 
from the RADIUS server contains not only the challenge, 
but the authentication method to be used. The client can 
reject  the  authentication  method  and  request  another, 
depending  on  the  configuration  of  the  client  software 
and the RADIUS server. The authentication method must 
be MD5. The client responds to the appropriate method 

with  its  credentials,  such  as  a  password  or  certificate. 
The  RADIUS  server  verifies  the  client  credentials  and 
responds with an accept or reject packet. If authentication 
is  successful,  the  Switch  allows  the  client  to  access  the 
network.  Otherwise,  network  access  is  denied  and  the 
port remains blocked.

The  operation  of  802.1X  on  the  Switch  requires  the 
following: 

The Switch must have an IP address assigned.

RADIUS authentication must be enabled on the Switch 
and the IP address of the RADIUS server specified.

802.1X must be enabled globally for the Switch.

Each Switch port that will be used must be set to dot1X 
“Auto” mode.

Each  client  that  needs  to  be  authenticated  must 
have  dot1X  client  software  installed  and  properly 
configured.

The RADIUS server and 802.1X client support EAP. (The 
Switch only supports EAPOL in order to pass the EAP 
packets from the server to the client.)

The RADIUS server and client also have to support the 
same  EAP  authentication  type  –  MD5.  (Some  clients 
have native support in Windows, otherwise the dot1x 
client must support it.)

Enable 802.1X 

Enables or disables 802.1X mode. 

NOTE:

 This option must be enabled to configure 

802.1X settings.

802.1X Settings

Port 

Displays the port number.

Set  Status 

Enables  or  disables  port  authentication.  By 

default,  port  authentication  is  enabled  which  means 
all  the  forwarding  traffic  needs  to  be  authorized  by  the 
RADIUS server. 

Show Client MAC 

Displays the MAC address of the last 

client who sends out EAPOL control frame.

Authorization 

Displays  the  authentication  status  of  an 

enabled port.

Click 

Save Settings

 to apply the changes.

Содержание SLM224G2

Страница 1: ...USER GUIDE BUSINESS SERIES 24 Port 10 100 2 Port 10 100 1000 Gigabit Advanced Smart Switch with 2 Combo SFPs Model SLM224G2...

Страница 2: ...web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network...

Страница 3: ...Chapter 4 Configuration Using the Console Interface 7 Overview 7 Configuring the HyperTerminal Application 7 Login 7 Configuring the Switch through the Console Interface 8 Chapter 5 Advanced Configura...

Страница 4: ...ree 25 Spanning Tree RSTP 25 Spanning Tree MSTP Properties 27 Spanning Tree MSTP Port Settings 27 Spanning Tree MSTP Instance Settings 28 Spanning Tree MSTP Interface Settings 29 Multicast 29 Multicas...

Страница 5: ...39 Fiber Optic Cabling 39 Appendix B Glossary 40 Appendix C Specifications 44 Appendix D Warranty Information 46 Appendix E Regulatory Information 47 FCC Statement 47 Safety Notices 47 Industry Canad...

Страница 6: ...voice and video traffic over data traffic Individual users or applications can also be prioritized above others using various Class of Serviceoptions byport Layer2priority 802 1p andLayer 3 priority...

Страница 7: ...ptimum transmission mode half or full duplex and data rate 10 100 or 1000 Mbps can be selected automatically if this feature is also supported by the attached device If a device connectedtooneofthesep...

Страница 8: ...AC power Console The Switch is equipped with a serial port labeled Console located on the back of the switch that allows you to connect to a computer s serial port for configuration purposes using th...

Страница 9: ...cables that are used for 100BASE TX connections should also work for 1000Base T providing that all four wire pairs are connected However it is recommended that for all critical connections or any new...

Страница 10: ...supply wiring Appropriate consideration of equipment nameplate ratings should be used when addressing this concern Reliable Earthing Reliable earthing of rack mounted equipment should be maintained Pa...

Страница 11: ...e port s corresponding LED will light up on the Switch Uplinking the Switch To uplink the Switch connect one end of a Cat 5 or better Ethernet network cable into one of the gigabit ports and thenconne...

Страница 12: ...of the Switch Configuring the HyperTerminal Application Click the Start button Select Programs Accessories Communications HyperTerminal Start Programs Accessories Communications HyperTerminal Enter a...

Страница 13: ...work dhcp enable disable Mgmt VLAN Configure the Management VLAN Syntax network mgmt vlan vid Password Change the admin password You will be prompted to enter the old password a new password and to co...

Страница 14: ...with time Now Displays the current time time zone and daylight saving status Syntax time now Set Configure the Switch s time manually Syntax time set YYYY MM DD HH MM SS Tzlist Displays the time zone...

Страница 15: ...ch tab contains screens that will help you configure and manage the Switch Setup Summary The Summary screen displays a summary of Switch information The settings cannot be modified from the Summary sc...

Страница 16: ...c will allow you to enter a static IP address subnet mask and default gateway using the text field provided Selecting DHCP disables these text fields and the Switch attempts to obtain an IP address au...

Страница 17: ...de on ports whenever possible to double the throughput of switch connections Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of packets...

Страница 18: ...egate link LAG An aggregated link offers a dramatic increase in bandwidth for network segments where bottlenecks exist as well as providing a fault tolerant link between two devices You can create up...

Страница 19: ...ent by allowing you to move devices to a new VLAN without having to change any physical connections VLANs can be easily organized to reflect departmental groups such as Marketing or R D usage groups s...

Страница 20: ...rry VLAN or CoS information NOTE An interface must be assigned to at least one group as an untagged port Tagged The interface is a member of the VLAN All packets transmitted by the port will be tagged...

Страница 21: ...n errors and overall traffic rates The History Control Table allows you to add edit and delete collection entries or to select a specific index entry and then view the historical data in table form St...

Страница 22: ...he number of fragments packets with less than 64 octets excluding framing bits but including FCS octets received on the interface since the device was last refreshed Jabbers Displays the total number...

Страница 23: ...val Sec Defines the time interval in seconds over which data is sampled and compared with the rising or falling threshold Interface The selected interface on the Switch Counter Selects the counter var...

Страница 24: ...d values are Supplicant Logoff 1 Port Failure 2 Supplicant Restart 3 Reauthentication Failure 4 AuthControlledPortControl set to ForceUnauthorized 5 Port Re initialization 6 Port Administratively Disa...

Страница 25: ...ther depending on the configuration of the client software and the RADIUS server The authentication method must be MD5 The client responds to the appropriate method with its credentials such as a pass...

Страница 26: ...dicates the port number for which storm control is enabled Storm Control Type Specifies the Storm Control Type currently enabled on the device The possible field values are Disabled Disable Storm Cont...

Страница 27: ...t you would like to add QoS Network traffic is usually unpredictable and the only basic assurance that can be offered is best effort traffic delivery To overcome this challenge Quality of Service QoS...

Страница 28: ...s IEEE 802 1p and 802 1Q tags to prioritize incoming traffic based on input from the end station application These functions can be used to provide independent priorities for delay sensitive data and...

Страница 29: ...ode Flow Diagram Mode Set the QoS Mode to one of the following options QoS Disabled Disables QoS functionality DSCP Based QoS When this option is selected DSCP mapping determines the packet queue IP P...

Страница 30: ...in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over when a primary link goes down SpanningTree RSTP Whi...

Страница 31: ...s the port is not participating in the Spanning Tree Click Save Port Settings to save the changes Edit RSTP Port Settings Spanning Tree RSTP Edit RSTP Port Settings Port Select the port range to confi...

Страница 32: ...s and LAN segments with a single Common and Internal Spanning Tree CIST The CIST is formed as a result of the running spanning tree algorithm between switches that support the STP RSTP MSTP protocols...

Страница 33: ...interface to forced STP compatible mode However you can also use the Migration Check Protocol to manually verify the appropriate BPDU format RSTP or STP compatible to send on the selected interfaces C...

Страница 34: ...ckets to root switch Designated Indicates that the port via which the designated switch is attached to the LAN Alternate Provides an alternate path to the root switch from the root interface Backup Pr...

Страница 35: ...GMP Query out of that port and removes the entry from its list Range 5 25 Default 10 Last member Query Interval Set the maximum amount oftimebetweengroup specificquerymessages including those sent in...

Страница 36: ...MP Simple Network Management Protocol SNMP is a communication protocol designed specifically for managing devices on a network Equipment commonly managed with SNMP includes switches routers and host c...

Страница 37: ...is defined for the group Access Read This options enables disables management access to read only AccessWrite This options enables disables management access to write only SNMP Group Membership The Gr...

Страница 38: ...munity Remote Station IP Indicates the management IP address of the SNMP Community Group Name Indicates the group name to which the SNMP Community belongs to SNMP Notification Settings SNMP Notificati...

Страница 39: ...Settings to save the changes Admin Static Address Switches store the addresses for all known devices in a forwarding database This information is used to forward traffic directly between the inbound a...

Страница 40: ...ID Displays the VLAN ID associated with the source MAC address Port Displays the port associated with the source MAC address Status Displays the status of the source MAC addresses Click Reload Address...

Страница 41: ...t are displayed in the table Admin Save Configuration The Save Configuration screen allows you to save and load configuration information using your Web browser Admin Save Configuration Via HTTP Upgra...

Страница 42: ...ocation To save the firmware file perform the following steps Click the Proceed button Click the Save button Select a location to save the file to and click Save Click the Close button ViaTFTP Defines...

Страница 43: ...a chronological order that are saved in RAM Cache Admin Memory Logs No Displays the log number Index Indicates the global sequence number for the log Level Indicates the severity of the log Category I...

Страница 44: ...f data per second the signaling hardware currently on the market can handle no more than a few gigabits of data per second Fiber cables come with two main connector types The most commonly used fiber...

Страница 45: ...Indicates that traffic is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An...

Страница 46: ...emented by the higher speed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to...

Страница 47: ...QoS allows network managers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In Use...

Страница 48: ...ted groups TX Rate Transmission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a...

Страница 49: ...B RFC1493 Bridge MIB RFC2674 Extended Bridge MIB P bridge Q bridge RFC2819 RMON MIB groups 1 2 3 9 only RFC2737 Entity MIB RFC 1215 Traps RMON Embedded Remote Monitoring RMON software agent supports f...

Страница 50: ...Standards 802 3 10BASE T Ethernet 802 3u 100BASE TX Fast Ethernet 802 3ab 1000BASE T Gigabit Ethernet 802 3z Gigabit Ethernet 802 3x Flow Control 802 3 ad LACP 802 1D STP 802 1Q p VLAN 802 1w Rapid S...

Страница 51: ...Somejurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other...

Страница 52: ...devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No...

Страница 53: ...o m stn mi ady Spr vn likvidace a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn...

Страница 54: ...Il est de votre responsabilit de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivi...

Страница 55: ...s ben Ha elavult berendez seinek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol...

Страница 56: ...vna likvid cia a recykl cia pom e zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na mi...

Страница 57: ...s Contact Information Website http www linksys com E Mail support linksys com FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization 949 82...

Отзывы: