background image

16/24-Port PoE Switch 

©r------------------' 

•  Client is the user terminal device which requires for LAN access, which is authenticated by 

the device end in the LAN. The client has to install client software which supports 802.1x 
authentication. 

•  Device end is the network device which controls client access in the LAN, it is located

between client and authentication server, which provides LAN access port for customers 
(physical port or logical port), and it implements authentication upon the connected client
via interaction with server. 

•  Authentication server is used to implement authentication, authorization and billing,

generally it is RADIUS (Remote Authentication Dial-In User Service) server. Authentication 
server can verify the legality of client according to the client authentication information sent
by device end, and inform the device of verification results, it is decided by device end
whether it allows client access or not. The role of authentication server can be replaced by
device in some small-scale network environment, which means that the device realizes 
local authentication, authorization and billing upon the client. 

6.7.2 802.1xAuthentication Controlled/Uncontrolled Port 

The LAN access ports provided by device for client can be divided into two logical ports which 
are controlled port and uncontrolled port. Any frame which arrived the port can be displayed 
on both controlled port and uncontrolled port. 

•  The uncontrolled port is always in the status of bidirectional connection, which is mainly

used to transmit authentication packet and make sure that the client can always send or 
receive authentication packet. 

•  The controlled port is always in the status of bidirectional connection under authorization 

status, which is used to transmit business packet; it is forbidden to receive any packet from
client when it is in the unauthorized status. 

6. 7 .3 Trigger Mode of 802.1 x Authentication

The authentication process of 802.1x is actively launched by client, it can be launched by 
device as well. 

1. Client Active Trigger Mode

•  Multicast trigger: the client actively send authentication request packet to device in order

to trigger authentication, the destination address of the packet is the multicast MAC address 
01-80-C2-00-00-03.

•  Broadcast trigger: the client actively send authentication request packet to device in order

to trigger authentication, the destination address of the packet is the broadcast MAC
address. The mode is able to solve the problem that the device fails to receive authentication
request from client because some devices fail to support the multicast packet above in the 
network.

2. Device Active Trigger Mode

The device active trigger mode is used to support the client which is unable to actively send 
authentication request packet, there are two types of device active trigger authentication: 

•  Multicast trigger: The device actively sends request packet of identity type to trigger

authentication to client at regular interval (it is 30s by default).

•  Unicast trigger: when the device receives unknown packet from source MAC address, it 

will actively send Identity-typed request packet to the MAC address unicast in order to
trigger authentication. It will send the packet again if the device fails to receive client
response within the setting duration.

6. 7 .4 Port Authorized Status

It can control if the port accessed users need to visit network source via authentication by 

configuring authorized status for the port. The port supports three following authorized states: 

•  Authorized-force: It means that the port is always in the authorized status, which allows

users to visit network source without authentication. 

•  Unauthorized-force: it means that the port is always in the unauthorized status, which

doesn't allow authentication for users. The device won't provide authentication service for
the client which is accessed to the port. 

•  Port based 802.1x: it means that the port initial status is unauthorized status, which doesn't 

allow users to visit network source; The port will be switched to authorized status if the users
pass authentication, and it will users to visit network source. 

Config Example: 

1.Network Requirement 
The client IP is 192.168.1.1/24 segment, authentication server IP is 192.168.1.100, and it is 
required to be authenticated by authentication server when all the ports of device are accessed. 
2.Config Steps
(1) Enable authentication function, all ports are enabled based on 802.1x authentication, 

which is shown in Figure 6-34.

Figure 6-34 

Glob1lyEN1bled 

Glob1t,'Enabled 

GlobalyEnabled 

GlobalyEnabltd 

Glob1lyEnobled 

Glob1lyEnabled 

GlobllyENlbled 

GlobalyEnabled 

Global)'Enabled 

Global)'E""bled 

Glob11)'EN1bled 

Globalt)'Ena­

Globat,'El'lllbled 

(2) Configure the address of authentication server,  which is shown in Figure 6-35.

Содержание VSPOE-SWA16

Страница 1: ...emperature in device will rise and may cause fire Do not place any object on the device Do not disassemble the device without professional instruction Warning Please use battery properly to avoid fire...

Страница 2: ...9 5 6Long Distance Transmit 20 6 Device Management 22 6 1 Ring Network 22 6 1 1 STP Definition 22 6 1 2 Basic Concepts of STP 23 6 1 3 STP Bridge Settings 24 6 1 4 STP Port Settings 25 6 2 VLAN Settin...

Страница 3: ...rt PoE power consumption management Support SNMP V1 V2 V3 network management Support STP RSTP ring network protocol Support manual aggregation and static LACP Support many to one mirroring Support por...

Страница 4: ...t power status Table 2 3 3Log in Switch 3 1 Switch Login It needs to log in switch first before configuring the switch users can intuitively manage and maintain PFS42 series Ethernet switch via Web ne...

Страница 5: ...check the flow of the current port and then click Port Statistics refer to Figure 3 4 for more details System Config Port Management Device Management PoE Figure 3 4 3 2 3 Config Display Section The...

Страница 6: ...address config Parameter Note IP address Switch management IP address whichcanmodify the management IP of the switch Subnet mask Switch subnet maskaddress which can modify config Default gateway Switc...

Страница 7: ...password all other information will be restored to factory default setting Figure 4 10 4 7 System Reboot It needs to save the config before rebooting the device Otherwise all the configurations will...

Страница 8: ...100M FULL 100M Full duplex 100M HALF 1DOM Half duplex 1000M FULL 1000M Full duplex Fiber port 1000M X 1000M Full duplex Table 5 3 Speed config It is to configure the port speed duplex mode Note It wi...

Страница 9: ...so that the port 1 can monitor the packets of port 2 and port 3 2 Settings 1 Enable port mirroring function and select the data streams to monitor 2 Select source port 3 Select destination port Now t...

Страница 10: ...speed of the port See Figure 5 6 2 Click Save button 50 50 Figure 5 6 50 50 5 5 Broadcast Storm Control The broadcast storm refers to a phenomenon the broadcast frames on the network are forwarded aga...

Страница 11: ...depends on the connection sp and Is as follow 10Mbps s 5000 I JS 100Mbps Is 5001 JS and 1Gbp Is 50 fJS Port Enoble 10 11 12 13 14 15 16 17 1B Figure 5 8 2 Click Save button 5 6 Long Distance Transmit...

Страница 12: ...rehensive numerical value of bridge priority and its MAC address and the bridge priority is a parameter which can be set The lower the Bridge ID the higher the bridge prioritybecomes which makes it in...

Страница 13: ...n gs S cunty SNMP Settings 802 1X tGMP SnOOfllnll PoE Figure 6 3 STP Mode Enable or disable ring network function Bridge Priority Set bridge priority it ranges from O to 61440 Hello Time Set the perio...

Страница 14: ...frame and put When VLAN ID is the Remove Tag and send out the the Tag of the default VLAN same as the defaultVLAf frame ID receive current frame When the VLAN ID is different from the default VLAN ID...

Страница 15: ...is three by default which can t be modified The default status of all the aggregation groups is disable member port is null by default Member Port The switch created all the aggregation groups by def...

Страница 16: ...o QoS IP network the device treats all packets as the same and the process policy is first in first out FIFO It allocates the required resources according to the time the packet arrived All packets sh...

Страница 17: ...e priority setup item becomes the high priority then the item will be put in the high priority line and then forward When there are several high priorities for the same level it adopts First In First...

Страница 18: ...y IPpriority Keywords Decimal system Binary system High priority I queue 46 101110 el 10 001010 af11 18 010010 af21 26 011010 af31 34 100010 af41 48 110000 cs6 56 111000 cs Low priority queue Others x...

Страница 19: ...rmation and etc 6 5 1 MAC Address List When device forwards the packet it searches the MAC address sheet according to the packet destination MAC address If the MAC address list includes an item matchi...

Страница 20: ...yers of these nodes and the properties of these objects such as object name access rights data type and etc Each Agent has its own MIB All managed devices have their own MIB file and compiling these M...

Страница 21: ...ad The default setup is public Write community The community name to access the network administrator The right is write The default setup is private Trap address It is to specify the server IP addres...

Страница 22: ...e is Md5 6 Authentication password is admin123 7 Encryption mode is CBC DES 8 The encryption password and confirm password is admin123 9 Input read write user name as user1 10 Authentication mode is M...

Страница 23: ...thentication request packet to device in order to trigger authentication the destination address of the packet is the broadcast MAC address The mode is able to solve the problem that the device fails...

Страница 24: ...in Figure 6 36 IGMP Snooping enable or disable IGMP Snooping function IGMP Leave Packet enable or disable the function of quick leave 7 1 PoE Settings Power over Ethernet PoE means the device uses the...

Страница 25: ...a PoE port Note PSE power overload When the total amount of the power consumption of all ports exceeds the maximum power of PSE the system considers the PSE is overloaded Total power It is to set PoE...

Страница 26: ...esume power on Monday 2 Set ports 3 Click Save Refer to Figure 7 5 for detailed information System Config Port Management Device Management PoE PoE Settings PoE Event Statistics D GreenPoE Green PoE P...

Отзывы: