TRENDnet TI-RP262i User Manual page 122

Managed industrial l2
Hide thumbs Also See for TI-RP262i:
Table of Contents

Advertisement

TRENDnet User's Guide
Specify how long the Switch will wait before communicating
Supp timeout
with the server. The acceptable range for this field is 0 to
65535 seconds.
Specify how long the Switch to time out the Authentication
Server timeout
Server. The acceptable range for this field is 0 to 65535
seconds.
Select this and click Apply to reset the custom 802.1x port
Reset to Default
authentication settings back to default.
Apply
Click Apply to add/modify the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Port Status
Port
This field displays the port number.
This field displays if 802.1x authentication is Enabled or
802.1x State
Disabled on the port.
This field displays the Admin Control Direction.
Both will drop incoming and outgoing packets on the port when
Admin Control
a user has not passed 802.1x port authentication.
Direction
In will drop only incoming packets on the port when a user has
not passed 802.1x port authentication.
This field displays if the subscriber must periodically re-enter his
Re-authentication
or her username and password to stay connected to the port.
This field displays the port control mode.
Auto requires authentication on the port.
Port Control Mode
Force Authorized forces the port to be authorized.
Force Unauthorized forces the port to be unauthorized. No
packets can Pass through the port.
This field displays the Guest VLAN setting for hosts that have
Guest VLAN
not passed authentication.
© Copyright 2018 TRENDnet. All Rights Reserved.
This field displays the amount of times the Switch will try to
Max-req Time
connect to the authentication server before determining the
server is down.
This field displays how often a client has to re-enter his or her
Reauth period
username and password to stay connected to the port.
This field displays the period of the time the client has to wait
Quiet period
before the next re-authentication attempt.
This field displays how long the Switch will wait before
Supp timeout
communicating with the server.
This field displays how long the Switch will wait before
Server timeout
communicating with the client.
Port Security
The Switch will learn the MAC address of the device directly connected to a particular
port and allow traffic through. We will ask the question: "How do we control who and
how many can connect to a switch port?" This is where port security can assist us. The
Switch allow us to control which devices can connect to a switch port or how many of
them can connect to it (such as when a hub or another switch is connected to the port).
Let's say we have only one switch port left free and we need to connect five hosts to it.
What can we do? Connect a hub or switch to the free port! Connecting a switch or a hub
to a port has implications. It means that the network will have more traffic. If a switch or
a hub is connected by a user instead of an administrator, then there are chances that
loops will be created. So, it is best that number of hosts allowed to connect is restricted
at the switch level. This can be done using the "port-security limit" command. This
command configures the maximum number of MAC addresses that can source traffic
through a port.
Port security can sets maximum number of MAC addresses allowed per interface. When
the limit is exceeded, incoming packets with new MAC addresses are dropped. It can be
use MAC table to check it. The static MAC addresses are included for the limit.
Note: If you configure a port of the Switch from disabled to enabled, all of the MAC
learned by this port will be clear.
Managed Industrial L2 Switch
119

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ti-pg102iTi-pg102i-mTi-g642iTi-g102iTi-g160wsTi-g160i

Table of Contents