TP-Link TL-SG3210 User Manual page 171

Jetstream l2 managed switch
Table of Contents

Advertisement

The following entries are displayed on this screen:
Configure
DoS Defend:
Defend Table
Select:
Defend Type:
Tips:
You are suggested to take the following further steps to ensure the network security.
1.
It's recommended to inspect and repair the system vulnerability regularly. It is also necessary
to install the system bulletins and backup the important information in time.
2.
The network administrator is suggested to inspect the physic environment of the network and
block the unnecessary network services.
3.
Enhance the network security via the protection devices, such as the hardware firewall.
11.4 802.1X
The 802.1X protocol was developed by IEEE802 LAN/WAN committee to deal with the security
issues of wireless LANs. It was then used in Ethernet as a common access control mechanism for
LAN ports to solve mainly authentication and security problems.
802.1X is a port-based network access control protocol. It authenticates and controls devices
requesting for access in terms of the ports of LAN access control devices. With the 802.1X
protocol enabled, a supplicant can access the LAN only when it passes the authentication,
whereas those failing to pass the authentication are denied when accessing the LAN.
Figure 11-16 DoS Defend
Enable/Disable DoS Defend function.
Select the entry to enable the corresponding Defend Type.
Displays the Defend Type name.
162

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tl-sg3216Tl-sg3424Jetstream tl-sg3210Jetstream tl-sg3216Jetstream tl-sg3424

Table of Contents