Linksys SRW2016 Switch User Manual


 
29
Chapter 5: Using the Web-based Utility for Configuration
Security Tab - 802.1x Users
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
Source IP Address. This is the interface source IP address to which the rule applies.
Network Mask. This is the IP subnetwork mask (or subnet mask).
Prefix Length. This is the number of bits that comprise the source IP address prefix or network mask of the
source IP address.
Action. This indicates whether to permit or deny management access per device.
Click the Submit button to save your changes.
Security Tab - 802.1x Users
The 802.1x Users screen allows you to enable port-based authentication and specify the authentication method
you want to use.
Port Based Network Access Control. Enable or disable port-based network access on the Switch.
Authentication Method. Select the authentication method you want to use, RADIUS, None; RADIUS; or None.
For the RADIUS, None method, port authentication is performed first via RADIUS (Remote Authentication Dial In
User Service). If the RADIUS server cannot be reached, then no authentication method is used. However, if a
failure occurs, the port remains unauthorized and access is not granted. If you want the authentication to occur at
the RADIUS server, select RADIUS. If you do not want to use an authentication method, then select None.
Click the Submit button to save your changes.
Security Tab - 802.1x Port Conf. (Configuration)
The 802.1x Port Configuration screen lists the Switch’s 802.1x ports and allows you to configure the
authentication settings per port. This authentication method uses a RADIUS server and the Extensible
Authentication Protocol (EAP).
Port Access Entity. This is the port name.
Controlled Port Control. This is the state of the port authorization. Traffic is forwarded if the state is
forceAuthorized. Traffic is discarded if the state is forceUnauthorized. If the state is Auto, then that means the
controlled port state is set by the authentication method.
Quiet Period. This is the number of seconds the Switch remains in the quiet state after an authentication
exchange has failed.
Figure 5-24: Security - 802.1x Users
Figure 5-25: Security - 802.1x Port Configuration