© Copyright 2019 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TL2-FG142
23
The IEEE 802.1X standard defines a port-based access control procedure that prevents
unauthorized access to a network by requiring users to first submit credentials for
authentication. One or more central servers, the backend servers, determine whether
the user is allowed access to the network. These backend (RADIUS) servers are
configured on the "Configuration→Security→AAA" page. The IEEE802.1X standard
defines port-based operation, but non-standard variants overcome security limitations
as shall be explored below.
MAC-based authentication allows for authentication of more than one user on the same
port, and doesn't require the user to have special 802.1X supplicant software installed
on his system. The switch uses the user's MAC address to authenticate against the
backend server. Intruders can create counterfeit MAC addresses, which makes MAC-
based authentication less secure than 802.1X authentication.
The NAS configuration consists of two sections, a system- and a port-wide.
System Configuration
Содержание TL2-FG142
Страница 1: ...TRENDnet User s Guide Cover Page...
Страница 123: ...Copyright 2019 TRENDnet All Rights Reserved TRENDnet User s Guide TL2 FG142 118 Click to delete configuration file...
Страница 127: ...Copyright 2019 TRENDnet All Rights Reserved TRENDnet User s Guide TL2 FG142 122 Certifications CE FCC UL...
Страница 134: ......