
© Copyright 2019 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
Industrial Managed Switch Series
106
Supp timeout
Specify how long the Switch will wait before communicating
with the server. The acceptable range for this field is 0 to
65535 seconds.
Server timeout
Specify how long the Switch to time out the Authentication
Server. The acceptable range for this field is 0 to 65535
seconds.
Reset to Default
Select this and click Apply to reset the custom 802.1x port
authentication settings back to default.
Apply
Click Apply to add/modify the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Port Status
Port
This field displays the port number.
802.1x State
This field displays if 802.1x authentication is Enabled or
Disabled on the port.
Admin Control
Direction
This field displays the Admin Control Direction.
Both will drop incoming and outgoing packets on the port when
a user has not passed 802.1x port authentication.
In will drop only incoming packets on the port when a user has
not passed 802.1x port authentication.
Re-authentication
This field displays if the subscriber must periodically re-enter his
or her username and password to stay connected to the port.
Port Control Mode
This field displays the port control mode.
Auto requires authentication on the port.
Force Authorized forces the port to be authorized.
Force Unauthorized forces the port to be unauthorized. No
packets can Pass through the port.
Guest VLAN
This field displays the Guest VLAN setting for hosts that have
not passed authentication.
Max-req Time
This field displays the amount of times the Switch will try to
connect to the authentication server before determining the
server is down.
Reauth period
This field displays how often a client has to re-enter his or her
username and password to stay connected to the port.
Quiet period
This field displays the period of the time the client has to wait
before the next re-authentication attempt.
Supp timeout
This field displays how long the Switch will wait before
communicating with the server.
Server timeout
This field displays how long the Switch will wait before
communicating with the client.
Port Security
The Switch will learn the MAC address of the device directly connected to a particular
port and allow traffic through. We will ask the question: “How do we control who and
how many can connect to a switch port?” This is where port security can assist us. The
Switch allow us to control which devices can connect to a switch port or how many of
them can connect to it (such as when a hub or another switch is connected to the port).
Let’s say we have only one switch port left free and we need to connect five hosts to it.
What can we do? Connect a hub or switch to the free port! Connecting a switch or a hub
to a port has implications. It means that the network will have more traffic. If a switch or
a hub is connected by a user instead of an administrator, then there are chances that
loops will be created. So, it is best that number of hosts allowed to connect is restricted
at the switch level. This can be done using the “port-security limit” command. This
command configures the maximum number of MAC addresses that can source traffic
through a port.
Port security can sets maximum number of MAC addresses allowed per interface. When
the limit is exceeded, incoming packets with new MAC addresses are dropped. It can be
use MAC table to check it. The static MAC addresses are included for the limit.
Note: If you configure a port of the Switch from disabled to enabled, all of the MAC
learned by this port will be clear.
Содержание TI-G160WS
Страница 1: ...TRENDnet User s Guide Cover Page...
Страница 148: ......