![VOLKTEK NSH-580 Скачать руководство пользователя страница 71](http://html1.mh-extra.com/html/volktek/nsh-580/nsh-580_user-manual_1045677071.webp)
VOLKTEK NSH-580 MANAGED 24-PORT 10/100 + 4 G COMBO L3 SWITCH
Content Aware
7.10 Security
The switch supports the 802.1x port-based security feature. Only authorized hosts are
allowed to access the switch port. Traffic from unauthenticated hosts will be blocked.
Authentication can be provided via a RADIUS server or the local database in the switch.
The switch also supports dynamic VLAN assignment through 802.1x authentication
process. The VLAN information for the users/ports should be configured in the
authentication server properly before enabling this feature.
7.10.1 Port Access Control
Port Access Control is used to configure various 802.1x parameters. 802.1x uses either
RADIUS server or local database to authenticate port users.
The first part is the Bridge (Global) settings:
Sys-Auth-Control:
checks it to enable the authentication
Authentication Method:
RADIUS or Local database can be used to authenticate the
port user.
The second part is the port settings:
Port:
Specify which port to configure from port list window.
Multi-host:
If enabled, ALL hosts connected to the selected port are allowed to use
the port if ONE of the hosts passed the authentication. If disabled, only ONE host is
allowed to use the port.
70