Tp-link TL-SG3109 Bedienungsanleitung Seite 39

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 120
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 38
32
33
Network Security Overview
Dening Network Authentication Properties
Conguring Trafc Control
5.2.1 Network Security Overview
This section provides an overview of network security and contains the following topics:
Port-Based Authentication
Advanced Port-Based Authentication
5.2.1.1 Port-Based Authentication
Port-based authentication authenticates users on a per-port basis via an external server. Only authenticated and approved
system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible
Authentication Protocol (EAP). Port-based authentication includes:
Authenticators Species the device port which is authenticated before permitting system access.
Supplicants Species the host connected to the authenticated port requesting to access the system ser-vices.
Authentication Server Specifies the server that performs the authentication on behalf of the authenticator, and
indicates whether the supplicant is authorized to access system services.
Port-based authentication creates two access states:
Controlled Access Permits communication between the supplicant and the system, if the supplicant is authorized.
Uncontrolled Access Permits uncontrolled communication regardless of the port state.
The device currently supports port-based authentication via RADIUS servers.
5.2.1.2 Advanced Port-Based Authentication
Advanced port-based authentication enables multiple hosts to be attached to a single port. Advanced port-based
authentication requires only one host to be authorized for all hosts to have system access. If the port is unautho-rized, all
attached hosts are denied access to the network.
Advanced port-based authentication also enables user-based authentication. Specific VLANs in the device are always
available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require
authentication, while data traffic requires authentication. VLANs for which authorization is not required can be defined.
Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are dened as authorized.
Advanced port-based authentication is implemented in the following modes:
Single Host Mode Allows port access only to the authorized host.
Multiple Host Mode — Multiple hosts can be attached to a single port. Only one host must be authorized for all hosts
to access the network. If the host authentication fails, or an EAPOL-logoff message is received, all attached clients are
denied access to the network.
Guest VLANs Provides limited network access to authorized ports. If a port is denied network access via port-
based authorization, but the Guest VLAN is enabled, the port receives limited network access. For example, a network
administrator can use Guest VLANs to deny network access via port-based authentication, but grant Internet access to
unauthorized users.
Unauthenticated VLANS Are available to users, even if the ports attached to the VLAN are dened as unauthorized.
5.2.2 Dening Network Authentication Properties
The Network Security Authentication Properties Page allows network managers to configure network authentication
Seitenansicht 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 119 120

Kommentare zu diesen Handbüchern

Keine Kommentare