Security; Configure Port Access Control - TRENDnet TEG-30102WS User Manual

10-port 2.5gbase-t web smart+ switch with 2 x 10g sfp+ slots
Table of Contents

Advertisement

TRENDnet User's Guide
Enter the MAC address in the User Defined OUI - Telephony OUI field of one of
the IP phones with the manufacturer's OUI.
Click Add. The new OUI entry is displayed in the table at the bottom of the
page.
Note: If you find more than one OUI among the IP phones you are installing,
enter one MAC address that represents each individual OUI. You can enter a
total of 16 OUIs.
Modify OUI Setting
To modify or delete an OUI, it must be first be deleted and then re-created.
Delete OUI Setting
To delete a specific OUI that had already been entered in the table at the bottom of the
page, click on Delete in the Action column of the table. The specific OUI will be deleted
from the table.
4. Click Save Settings to Flash (menu).
5. Click Save Settings to Flash (button), then click OK.
Note: This step saves all configuration changes to the NV-RAM to ensure that if the
switch is rebooted or power cycled, the configuration changes will still be applied.
© Copyright 2018 TRENDnet. All Rights Reserved.

Security

This chapter contains information about the Port-based security features and the
procedures for setting this feature.

Configure Port Access Control

Security > Port Access Control
This section contains information and configuration procedures for the
Port-based Access Control. Port-based Network Access Control (IEEE 802.1x) is used to
control who can send traffic through and receive traffic from a switch port. With this
feature, the switch does not allow an end node to send or receive traffic through a port
until the user of the node logs on by entering a user name and password.
This feature can prevent an unauthorized individual from connecting a computer to a
port or using an unattended workstation to access your network resources. Only those
users to whom you have assigned a user name and password are able to use the switch
to access the network.
This feature can be used with one of two authentication methods:
The RADIUS authentication protocol requires that a remote RADIUS server is
present on your network. The RADIUS server performs the authentication of
the user name and password combinations.
The Dial-in User (local) authentication method allows you to set up the
authentication parameters internally in the switch without an external server.
In this case, the user name and password combinations are entered in the
associated with an optional VLAN when they are defined. Based on these
entries, the authentication process is done locally by the Web Management
Utility using a standard EAPOL transaction.
Note: RADIUS with Extensible Authentication Protocol (EAP) extensions is the only
supported authentication server for this feature.
1. Log into your switch management page (see
on page 11).
2. Click on Security and click on Port Access Control.
TEG-30102WS
"Access your switch management
page"
72

Advertisement

Table of Contents
loading

Table of Contents