![Planet GSW-24040R Скачать руководство пользователя страница 218](http://html1.mh-extra.com/html/planet/gsw-24040r/gsw-24040r_user-manual_1563253218.webp)
User’s Manual of SGSW-24040 / 24240 Series
218
is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.
The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.
Overview of User Authentication
It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local
or remote authentication methods, such as telnet and Web browser. This Managed Switch provides secure network
management access using the following options:
Remote Authentication Dial-in User Service (RADIUS)
Terminal Access Controller Access Control System Plus ()
Local user name and Priviledge Level control
RADIUS and
are logon authentication protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An
authentication server
contains a database of multiple user
name / password pairs with associated privilege levels for each user that requires management access to the Managed Switch.
4.11.1 Understanding IEEE 802.1X Port-Based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized
clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client
connected to a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1X access control allows only
Extensible Authentication Protocol over LAN (EAPOL)
traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the
port.
This section includes this conceptual information:
•
Device Roles
•
Authentication Initiation and Message Exchange
•
Ports in Authorized and Unauthorized States
Device Roles
With 802.1X port-based authentication, the devices in the network have specific roles as shown below.
Содержание GSW-24040R
Страница 42: ...User s Manual of SGSW 24040 24240 Series 42 Figure 2 13 SGSW 24040 24040R Series Stack Ports ...
Страница 62: ...User s Manual of SGSW 24040 24240 Series 62 Figure 4 1 5 SGSW Managed Switch Main Functions Menu ...
Страница 142: ...User s Manual of SGSW 24040 24240 Series 142 Figure 4 6 10 Port 1 Port 6 VLAN Configuration ...
Страница 199: ...User s Manual of SGSW 24040 24240 Series 199 Figure 4 9 14 Voice VLAN Configuration page screenshot ...
Страница 223: ...User s Manual of SGSW 24040 24240 Series 223 Figure 4 11 4 Network Access Server Configuration page screenshot ...
Страница 260: ...User s Manual of SGSW 24040 24240 Series 260 Figure 4 12 1 Port Limit Control Configuration Overview page screenshot ...
Страница 452: ...User s Manual of SGSW 24040 24240 Series 452 Example Show RADIUS statistics SWITCH security aaa statistics ...
Страница 474: ...User s Manual of SGSW 24040 24240 Series 474 Parameters vid VLAN ID 1 4095 Default Setting disable ...
Страница 510: ...User s Manual of SGSW 24040 24240 Series 510 Example Enable the mirror mode for port 1 4 SWITCH mirror mode 1 4 enable ...