Port Authentication - NETGEAR GS110TP - ProSafe Gigabit Smart Switch Software Administration Manual

Smart switch
Hide thumbs Also See for GS110TP - ProSafe Gigabit Smart Switch:
Table of Contents

Advertisement

GS108T and GS110TP Smart Switch Software Administration Manual
To configure global 802.1X settings:
Select the appropriate radio button in the Port Based Authentication State field to
1.
enable or disable 802.1X administrative mode on the switch.
Enable. Port-based authentication is permitted on the switch.
If 802.1X is enabled, authentication is performed by a RADIUS
Note:
server. This means the primary authentication method must be
RADIUS. To set the method, go to Security > Management
Security > Authentication List and select RADIUS as method 1 for
defaultList. For more information, see
Configuration
Disable. The switch does not check for 802.1X authentication before allowing traffic
on any ports, even if the ports are configured to allow only authenticated users.
Select the appropriate radio button in the Guest VLAN field to enable or disable the guest
2.
VLAN supplicant mode.
Enabled. When no 802.1X supplicant is authenticated on a port, the port still provides
limited network access, as determined by a guest VLAN configured on the
authentication server.
Disabled. A guest VLAN cannot be used for unauthorized ports.
Click Cancel to cancel the configuration on the screen and reset the data on the screen to
3.
the latest value of the switch.
If you change the settings, click Apply to apply the new settings to the system.
4.

Port Authentication

Use the Port Authentication page to enable and configure port access control on one or more
ports.
To access the Port Authentication page, click Security  Port Authentication, and then click
the Advanced  Port Authentication link.
Use the horizontal scroll bar at the bottom of the browser to view all
Note:
the fields on the Port Authentication page. The following screen
shots show the left and right halves of the Port Authentication page.
on page 155.
Authentication List
Chapter 5: Managing Device Security
| 165

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents