manualshive.com logo in svg
background image

Chapter 

Configuring the Switch

2

24-Port 10/100 + 4-Port Ggabt Swtch wth WebVew and Power over Ethernet

TACACS Server Setting

The  Switch  provides  Terminal  Access  Controller  Access 
Control  System  ()  client  support .   
provides  centralized  security  for  validation  of  users 
accessing the device .  provides a centralized user 
management system, while still retaining consistency with 
RADIUS and other authentication processes . The  
protocol  ensures  network  integrity  through  encrypted 
protocol  exchanges  between  the  device  and   
server .

Server IP Address 

Enter the  Server IP address .

Server Port Number (1-) 

Defines the port number 

through  which  the   session  occurs . The  default 
port is 49 .

Secret  Key  Strng 

Defines  the  authentication  and 

encryption key for  server . The key must match 
the encryption key used on the  server . 

Security > 802.1x Settings

Security > 802 .1x Settings

Network  switches  can  provide  open  and  easy  access 
to  network  resources  by  simply  attaching  a  client  PC . 
Although  this  automatic  configuration  and  access  is  a 
desirable  feature,  it  also  allows  unauthorized  personnel 
to  easily  intrude  and  possibly  gain  access  to  sensitive 
network data .

The  IEEE  802 .1X  (dot1X)  standard  defines  a  port-based 
access  control  procedure  that  prevents  unauthorized 
access  to  a  network  by  requiring  users  to  first  submit 
credentials for authentication . Access to all switch ports in 
a network can be centrally controlled from a server, which 
means that authorized users can use the same credentials 
for authentication from any point within the network .

This  Switch  uses  the  Extensible  Authentication  Protocol 
over LANs (EAPOL) to exchange authentication protocol 
messages  with  the  client,  and  a  remote  RADIUS 
authentication  server  to  verify  user  identity  and  access 
rights . When a client connects to a switch port, the Switch 
responds  with  an  EAPOL  identity  request .  The  client 
provides  its  identity  (such  as  a  user  name)  in  an  EAPOL 
response to the Switch, which it forwards to the RADIUS 
server . The RADIUS server verifies the client identity and 
sends an access challenge back to the client . The EAP packet 
from the RADIUS server contains not only the challenge, 
but the authentication method to be used . The client can 
reject  the  authentication  method  and  request  another, 
depending  on  the  configuration  of  the  client  software 
and the RADIUS server . The authentication method must 
be MD5 . The client responds to the appropriate method 
with  its  credentials,  such  as  a  password  or  certificate . 
The  RADIUS  server  verifies  the  client  credentials  and 
responds with an accept or reject packet . If authentication 
is  successful,  the  Switch  allows  the  client  to  access  the 
network .  Otherwise,  network  access  is  denied  and  the 
port remains blocked .

The  operation  of  802 .1X  on  the  Switch  requires  the 
following: 

The Switch must have an IP address assigned .

RADIUS authentication must be enabled on the Switch 
and the IP address of the RADIUS server specified .

802 .1X must be enabled globally for the Switch .

Each Switch port that will be used must be set to dot1X 
“Auto” mode .

Each  client  that  needs  to  be  authenticated  must 
have  dot1X  client  software  installed  and  properly 
configured .

The RADIUS server and 802 .1X client support EAP . (The 
Switch only supports EAPOL in order to pass the EAP 
packets from the server to the client .)

The RADIUS server and client also have to support the 
same  EAP  authentication  type  –  MD5 .  (Some  clients 
have native support in Windows, otherwise the dot1x 
client must support it .)

To  enable  802 .1X  System  Authentication  Control,  select 
the 

RADIUS

 option .

When  802 .1X  is  enabled,  you  need  to  configure  the 
parameters  for  the  authentication  process  that  runs 
between  the  client  and  the  Switch,  as  well  as  the  client 
identity lookup process that runs between the Switch and 
authentication server . These parameters are described in 
this section .

Содержание SRW224G4P

Страница 1: ...USER GUIDE BUSINESS SERIES 24 Port 10 100 4 Port Gigabit Switch with WebView and Power over Ethernet Model SRW224G4P...

Страница 2: ...able Requirements 5 Positioning the Switch 5 Placement Options 5 Desktop Placement 6 Rack Mount Placement 6 Hardware Installation 6 Uplinking the Switch 6 Chapter 4 Configuration Using the Console Int...

Страница 3: ...d ACL 25 ACL MAC based ACL 25 Security 26 Security ACL Binding 26 Security Authentication Servers 26 Security 802 1x Settings 27 Security Ports Security 28 Security HTTPS Settings 29 Security Manageme...

Страница 4: ...Database 49 Admin Log 50 Admin Port Mirroring 51 Admin Cable Test 52 Admin Ping 52 Admin Save Configuration 52 Admin Jumbo Frame 53 Admin Firmware Upgrade 53 Admin HTTP Upgrade 53 Admin Reboot 54 Admi...

Страница 5: ...site address or e mail address Online Resources Most web browsers allow you to enter the web address without adding the http in front of the address This User Guide will refer to websites without incl...

Страница 6: ...evices eliminating the need for an additional power source and cutting down on the amount of cables attached to each device Once configured to supply power an automatic detection process is initialize...

Страница 7: ...d and duplex accordingly The Switch s 10 100 RJ 45 ports also support the IEEE 802 3af Power over Ethernet PoE standard thatenablesDCpowertobesuppliedtoattached devicesusingwiresintheconnectingtwisted...

Страница 8: ...cabling To establish a Fast Ethernet connection using a miniGBIC port you will need to install a MFEFX1 100BASE FX or MFELX1 100BASE LX 100SFP Transceiver and use fiber optic cabling Back Panel The c...

Страница 9: ...ex mode the maximum cable length using Category 5 cable is 328 feet 100 meters 1000BASE T Cable Requirements All Category 5 UTP cables that are used for 100Base TX connections should also work for 100...

Страница 10: ...e Installation instructions below Hardware Installation To connect network devices to the Switch follow these instructions MakesureallthedevicesyouwillconnecttotheSwitch are powered off Connect a Cate...

Страница 11: ...plication Configuring the HyperTerminal Application Click the Start button Select Programs Accessories Communications HyperTerminal Start Programs Accessories Communications HyperTerminal Enter a name...

Страница 12: ...ttom of the window provides help indicating the appropriate keys to use Login When you finish configuring the HyperTerminal the Login screen appears The first time you open the Console Interface use t...

Страница 13: ...Mac Address System Contact System Name and System Location General Information Management Settings The Management Settings screen displays the Serial Port Configuration Management Settings Serial Por...

Страница 14: ...are members of VLAN 1 so a management station can be connected to any port on the Switch However if other VLANs are configured and you change the Management VLAN you may lose management access to the...

Страница 15: ...e code file Startup config If the file is a configuration file DestinationFile Specifywherethefileistobetransferred Select one of the following TFTP If the file is to be uploaded to a TFTP server Imag...

Страница 16: ...it again once the problem has been resolved You may also disable an interface for security reasons Auto negotiation Port Capabilities This option enables or disables auto negotiation When auto negotia...

Страница 17: ...w the current PoE settings for each port on the Switch Power Port Status Ports can be set to one of three power priority levels critical high or low To control the power supply within the Switch s bud...

Страница 18: ...e the Switch Setup Summary The Setup Summary screen displays a summary of Switch information The settings cannot be modified from the Setup Summary screen Many of the settings can be modified from the...

Страница 19: ...The system object identifier is displayed here Base MAC Address Physical address of a device mapped to this interface IP Configuration To manually configure IP settings you need to set an IP address...

Страница 20: ...ll each server in the sequence Setup Time SetTime Set the system time manually This option allows you to set the time and date manually for the Switch Set the system time using Simple Network Time Pro...

Страница 21: ...ys the link status of the port Speed Displays the current speed of the port Duplex Displays the current duplex mode of the port MDI MDIX Indicates if the port is being utilized as an MDI or MDIX port...

Страница 22: ...virtual aggregate link LAG An aggregated link offers a dramatic increase in bandwidth for network segments where bottlenecks exist as well as providing a fault tolerant link between two devices You ca...

Страница 23: ...sure you enable LACP before connecting the ports and also disconnect the ports before disabling LACP Port Management LACP Set Port Actor This menu sets the local side of an aggregate link that is the...

Страница 24: ...VLAN Management Port Settings You can configure VLAN behavior for specific interfaces including the mode accepted frame type VLAN identifier PVID and ingress filtering Mode IndicatesVLAN membership m...

Страница 25: ...ort Mode Indicates VLAN membership mode for an interface Default Access Access Is the default setting for all ports The port is a member of a single untagged VLAN Trunk Specifies a port as an end poin...

Страница 26: ...cs Statistics RMON Statistics Toviewtheinterfacestatisticsforaport selecttherequired interface from the drop down menu and click Query To set a refresh rate to update the interface statistics select a...

Страница 27: ...reshold An alarm threshold for the sampled variable If the current value is greater than or equal to the threshold and the last sample value was less than the threshold then an alarm will be generated...

Страница 28: ...e of an event and the description of the event that activated the entry Statistics Port Utilization Statistics Port Utilization Displays the percentage of bandwidth currently utilized on each port of...

Страница 29: ...IP address or select the Any option to apply the rule to all IP addresses Source Destination IP Address Enter a source or destination IP address Wildcard Mask Enter the Wildcard Mask for the Source De...

Страница 30: ...to enable globally Click Save Settings to save the changes Security Authentication Servers Security Authentication Servers RADIUS Server Setting Remote Authorization Dial In User Service RADIUS serve...

Страница 31: ...cts to a switch port the Switch responds with an EAPOL identity request The client provides its identity such as a user name in an EAPOL response to the Switch which it forwards to the RADIUS server T...

Страница 32: ...configuration of the following parameters Maximum Request Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it times out the authentication s...

Страница 33: ...s checkbox and specify the port number Click Save Settings to save the changes Security Management ACL Security Management ACL You can create a list of up to 16 IP addresses or IP address groups that...

Страница 34: ...thentication fails and the client has to restart the authentication process Default 3 SSH Server Key Size 512 896 Specifies the SSH server key size The server key is a private key that is never shared...

Страница 35: ...affic classes which are handled as an aggregate whole with no per flow settings CoS is usually related to the 802 1p service that classifies flows according to their Layer 2 priority as set in the VLA...

Страница 36: ...le that requires all traffic in a higher priority queue to be processed before lower priority queues are serviced or use Weighted Round Robin WRR queuing that specifies a relative weight of each queue...

Страница 37: ...d in each packet Based on configured network policies different types of traffic can be marked for different types of forwarding All switches or routers that access the Internet rely on class informat...

Страница 38: ...d Gigabit Ethernet ingress ports QoS DiffServ Settings Edit Policy Element Policing is based on a token bucket where bucket depth that is the maximum burst before the bucket overflows is by specified...

Страница 39: ...mit traffic coming out of the Switch Traffic that falls within the rate limit is transmitted while packets that exceed the acceptable amount of traffic are dropped Rate limiting can be applied to indi...

Страница 40: ...before attempting to reconfigure All device ports except for designated ports should receive configuration messages at regular intervals Any port that ages out STA information provided in the last co...

Страница 41: ...68 36864 40960 45056 49152 53248 57344 61440 Hello Time Interval in seconds at which the root device transmits a configuration message To enable Hello Time click the HelloTime option and enter the req...

Страница 42: ...erational Edge Port This parameter is initialized to the setting for Administrative Edge Port in STP Port Setting detail but will be set to false if a BPDU is received indicating that another bridge i...

Страница 43: ...ng Tree has been enabled on this interface Status Displays current state of this port within the Spanning Tree Discarding PortreceivesSTAconfigurationmessages but does not forward packets Learning Por...

Страница 44: ...a separate Multiple Spanning Tree MST for each instance to maintain connectivity among each of the assigned VLAN groups MSTP then builds a Internal Spanning Tree IST for the Region containing all comm...

Страница 45: ...ges but does not forward packets Learning Porthastransmittedconfigurationmessages for an interval set by the Forward Delay parameter without receiving contradictory information Port address table is c...

Страница 46: ...same the port with the highest priority i e lowest value will be configured as an active link in the Spanning Tree This makes a port with higher priority less likely to be blocked if the Spanning Tre...

Страница 47: ...e Sets the time between receiving an IGMP Report for an IP multicast address on a port before the Switch sends an IGMP Query out of that port and removes the entry from its list Range 5 25 seconds Def...

Страница 48: ...nd the IP address for a multicast service from the drop down menus The Switch will display all the interfaces that are propagating this multicast service Multicast Router Ports Query Multicast Router...

Страница 49: ...MPv3 packets A local engine ID is automatically generated that is unique to the switch This is referred to as the default engine ID If the local engine ID is deleted or changed all SNMP users will be...

Страница 50: ...ype from the drop down menu Define a view name and specify subtree ID in the switch MIB to be included or excluded in the view Click Add to save the new view SNMP Group Profile SNMP Group Profile Grou...

Страница 51: ...on Options MD5 SHA Default MD5 Authentication Password A minimum of eight plain text characters is required Data Privacy Privacy Protocol The encryption algorithm use for data privacy only 56 bit DES...

Страница 52: ...authentication and encryption only available for the SNMPv3 security model UDP Port Specifies the UDP port number used by the trap manager Timeout The number of seconds to wait for an acknowledgment b...

Страница 53: ...eassigned a static address MAC Address XX XX XX XX XX XX Physical address of a device mapped to this interface VLAN ID of a configured VLAN 1 4094 Specify the interface the static MAC address and VLAN...

Страница 54: ...he Switch s permanent flash memory for all levels up to the specified level For example if level 3 is specified all messages from level 0 to level 3 will be logged to flash NOTE The Flash Level must b...

Страница 55: ...three recipient SMTP server IP addresses The Switch attempts to connect to the other listed servers if the first fails Source E mail Address Sets the e mail address used for the From field in alert m...

Страница 56: ...some commonly displayed results of a ping Normal response The normal response occurs in one to ten seconds depending on network traffic Destination does not respond If the host does not respond a tim...

Страница 57: ...he network between the two end nodes must be able to accept the extended frame size And for half duplex connections all devices in the collision domain would need to support jumbo frames Enabling jumb...

Страница 58: ...the file on the PC then click Save Settings Admin Reboot Restarts the Switch retaining the current configuration settings Admin Reboot Click the Reboot button then click OK to confirm Admin Factory D...

Страница 59: ...ta per second the signaling hardware currently on the market can handle no more than a few gigabits of data per second Fiber cables come with two main connector types The most commonly used fiber opti...

Страница 60: ...icates that traffic is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An app...

Страница 61: ...ed by the higher speed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to recei...

Страница 62: ...QoS allows network managers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In Use...

Страница 63: ...groups TX Rate Transmission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newe...

Страница 64: ...RMON groups history statistics alarms and events for enhanced traffic management monitoring and analysis Firmware Upgrade Web browser upgrade HTTP TFTP upgrade Port Mirroring Traffic on a port can be...

Страница 65: ...cking Head of line blocking prevention Jumbo frame Supports frames up to 10K byte frames Standards 802 3 10BASE T Ethernet 802 3u 100BASE TX Fast Ethernet 802 3ab 1000BASE T Gigabit Ethernet 802 3z Gi...

Страница 66: ...PRESS OR IMPLIED CONDITIONS REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty...

Страница 67: ...on To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product...

Страница 68: ...produktet og eller emballagen ikke m bortskaffes som usorteret kommunalt affald Symbolet betyder at dette produkt skal bortskaffes adskilt fra det almindelige husholdningsaffald Det er dit ansvar at...

Страница 69: ...egnate con questo simbolo sul prodotto e o sull imballaggio non siano smaltite insieme ai rifiuti urbani non differenziati Il simbolo indica che questo prodotto non deve essere smaltito insieme ai nor...

Страница 70: ...atieve gevolgen voor het milieu en de gezondheid Voor meer informatie over het vernietigen van uw oude apparatuur neemt u contact op met de plaatselijke autoriteiten of afvalverwerkingsdienst of met d...

Страница 71: ...ravje ljudi e elite izvedeti ve o odlaganju stare opreme se obrnite na lokalno upravo odpad ali trgovino kjer ste izdelek kupili Suomi Finnish Ymp rist koskevia tietoja EU alueen asiakkaille EU direkt...

Страница 72: ...ntact Information Website http www linksys com E Mail support linksys com FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization 949 823 30...

Отзывы: