147 - TRENDnet TI-PG1284i User Manual

12-port hardened industrial gigabit poe+ layer 2+ managed din-rail switch
Hide thumbs Also See for TI-PG1284i:
Table of Contents

Advertisement

TRENDnet User's Guide
Configures the bitmap mask of the source MAC of the packets
that you want to filter.
Mask of Source
If the Source MAC field has been configured and this field is
MAC
empty, it means the profile will filter the one MAC configured in
Source MAC field.
Configures the destination MAC of the packets that you want to
Destination MAC
filter.
Configures the bitmap mask of the destination MAC of the packets
that
Mask
of
If the Destination MAC field has been configured and this field is
Destination MAC
empty, it means the profile will filter the one MAC configured in
Destination MAC field.
DSCP
Configure the DSCP for the profile.
802.1p
Configures the 802.1p for the profile.
Source IP
Configures the source IP of the packets that you want to filter.
Configures the bitmap mask of the source IP of the packets that
you
Mask of Source IP
If the Source IP field has been configured and this field is empty, it
means the profile will filter the one IP configured in Source IP field.
Destination IP
Configures the destination IP of the packets that you want to filter.
Configures the bitmap mask of the destination IP of the packets
that
Mask
of
If the Destination IP field has been configured and this field is
Destination IP
empty, it means the profile will filter the one IP configured in
Destination IP field.
Configures the IP protocol type. The setting will be used for Source
Application and Destination Application.
IP Protocol
TCP:0x06. UDP:0x11.
© Copyright 2016 TRENDnet. All Rights Reserved.
you
want
to
want
to
you
want
to
Source
Application
Destination
Application
Source
Interface(s)
Apply
filter.
Refresh
802.1x
IEEE 802.1X is an IEEE Standard for port-based Network Access Control ("port" meaning a
single point of attachment to the LAN infrastructure). It is part of the IEEE 802.1 group of
networking protocols. It provides an authentication mechanism to devices wishing to
attach to a LAN, either establishing a point-to-point connection or preventing it if
authentication fails. It is used for most wireless 802.11 access points and is based on the
filter.
Extensible Authentication Protocol (EAP).
802.1X provides port-based authentication, which involves communications between a
supplicant, authenticator, and authentication server. The supplicant is often software on
a client device, such as a laptop, the authenticator is a wired Ethernet switch or wireless
access point, and an authentication server is generally a RADIUS database. The
authenticator acts like a security guard to a protected network. The supplicant (i.e., client
filter.
device) is not allowed access through the authenticator to the protected side of the
network until the supplicant's identity is authorized. An analogy to this is providing a valid
passport at an airport before being allowed to pass through security to the terminal. With
802.1X port-based authentication, the supplicant provides credentials, such as user
name/password or digital certificate, to the authenticator, and the authenticator
forwards the credentials to the authentication server for verification. If the credentials
are valid (in the authentication server database), the supplicant (client device) is allowed
to access resources located on the protected side of the network.
Configures the source UDP/TCP ports of the packets that you want
to filter.
Configures the destination UDP/TCP ports of the packets that you
want to filter.
Configures one or a rage of the source interfaces of the packets
that you want to filter.
Click Apply to add/modify the settings.
Click Refresh to begin configuring this screen afresh.
TI-PG1284i

147

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents