Security Tab - 802.1X Users; Security Tab - 802.1X Port Conf. (Configuration); Figure 5-24: Security - 802.1X Users; Figure 5-25: Security - 802.1X Port Configuration - Linksys SRW2016 User Manual

16- or 24-port 10/100/1000 gigabit switch with webview
Hide thumbs Also See for SRW2016:
Table of Contents

Advertisement

16- or 24-Port 10/100/1000 Gigabit Switch with WebView
Source IP Address. This is the interface source IP address to which the rule applies.
Network Mask. This is the IP subnetwork mask (or subnet mask).
Prefix Length. This is the number of bits that comprise the source IP address prefix or network mask of the
source IP address.
Action. This indicates whether to permit or deny management access per device.
Click the Submit button to save your changes.

Security Tab - 802.1x Users

The 802.1x Users screen allows you to enable port-based authentication and specify the authentication method
you want to use.
Port Based Network Access Control. Enable or disable port-based network access on the Switch.

Figure 5-24: Security - 802.1x Users

Authentication Method. Select the authentication method you want to use, RADIUS, None; RADIUS; or None.
For the RADIUS, None method, port authentication is performed first via RADIUS (Remote Authentication Dial In
User Service). If the RADIUS server cannot be reached, then no authentication method is used. However, if a
failure occurs, the port remains unauthorized and access is not granted. If you want the authentication to occur at
the RADIUS server, select RADIUS. If you do not want to use an authentication method, then select None.
Click the Submit button to save your changes.

Security Tab - 802.1x Port Conf. (Configuration)

The 802.1x Port Configuration screen lists the Switch's 802.1x ports and allows you to configure the
authentication settings per port. This authentication method uses a RADIUS server and the Extensible
Authentication Protocol (EAP).
Port Access Entity. This is the port name.
Controlled Port Control. This is the state of the port authorization. Traffic is forwarded if the state is
forceAuthorized. Traffic is discarded if the state is forceUnauthorized. If the state is Auto, then that means the
controlled port state is set by the authentication method.
Quiet Period. This is the number of seconds the Switch remains in the quiet state after an authentication
exchange has failed.

Figure 5-25: Security - 802.1x Port Configuration

Chapter 5: Using the Web-based Utility for Configuration
29
Security Tab - 802.1x Users

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Srw2024

Table of Contents