Chapter 18 Port Authentication
GS1920v2 Series User’s Guide
177
18.5 Te c hnic a l Re fe re nc e
This section provides technical background information on the topics discussed in this chapter.
18.5.1 IEEE 802.1x
The IEEE 802.1x is a standard for authentication as well as providing additional accounting and control
features. It can be implemented both on wired and wireless networks. It is supported by Windows XP and
a number of network devices. Some advantages of IEEE 802.1x are:
• User based identification
• Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user
profile and accounting management on a network RADIUS server.
• Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional authentication
methods to be deployed with no changes to the switch or the wired clients.
18.5.2 RADIUS
RADIUS is based on a client-server model that supports authentication, authorization and accounting.
The switch is the client and the server is the RADIUS server. The RADIUS server handles the following tasks:
• Authentication
Determines the identity of the users.
• Authorization
Determines the network services available to authenticated users once they are connected to the
network.
• Accounting
Keeps track of the client’s network activity.
RADIUS is a simple package exchange in which your switch acts as a message relay between the wired
client and the network RADIUS server.
*
Use this row to make the setting the same for all ports. Use this row first and then make
adjustments on a port-by-port basis.
Note: Changes in this row are copied to all the ports as soon as you make them.
Active
Select this check box to permit MAC authentication on this port. You must first allow MAC
authentication on the Switch before configuring it on each port.
Apply
Click
Apply
to save your changes to the Switch’s run-time memory. The Switch loses these
changes if it is turned off or loses power, so use the
Sa ve
link on the top navigation panel to
save your changes to the non-volatile memory when you are done configuring.
Cancel
Click
C a nc e l
to begin configuring this screen afresh.
Table 68 Advanced Application > Port Authentication > MAC Authentication (continued)
LABEL
DESC RIPTIO N
Содержание GS1920-48HPv2
Страница 19: ...19 PA RT I Use r s Guide...
Страница 43: ...43 PA RT II T e c hnic al Re fe re nc e...
Страница 124: ...Chapter 9 VLAN GS1920v2 Series User s Guide 124 Figure 97 Advanced Application VLAN Port Based VLAN Setup Port Isolation...
Страница 155: ...Chapter 13 Spanning Tree Protocol GS1920v2 Series User s Guide 155 Figure 118 MSTP and Legacy RSTP Network Example...
Страница 193: ...GS1920v2 Series User s Guide 193 Figure 140 Classifier Example...
Страница 224: ...Chapter 24 Multicast GS1920v2 Series User s Guide 224 Figure 162 MVR Group Configuration Example 2 EXAMPLE...
Страница 367: ...Chapter 40 Access Control GS1920v2 Series User s Guide 367 Figure 271 Example Lock Denoting a Secure Connection EXAMPLE...
Страница 388: ...Chapter 48 Configure Clone GS1920v2 Series User s Guide 388 Figure 284 Management Configure Clone...