User Manual

Table Of Contents
8-Port Gigabit (PoE+) Ethernet Smart Managed Pro Switch with (2 SFP or 2 Copper Ports and)
Cloud Management
Manage Device Security User Manual330
2. Launch a web browser.
3. In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see
Access the switch on-network and
connected to the Internet on page 20 or Access the switch off-network and not
connected to the Internet on page 28.
The Device UI login page displays.
If you did not yet activate your warranty, the Register to activate your warranty page
displays. For more information, see
Register the switch on page 31.
4. Enter one of the following passwords:
Enter your device admin password.
If you previously managed the switch through the Insight app or
Cloud portal, enter
the Insight network password for the last Insight network location.
For information about the credentials, see
Credentials for the device UI on page 29.
5. Click the Go
button.
The System Information page displays.
6. Select Security >
Access > Access Control > Access Profile Configuration.
The Access Profile Configuration page displays. The Deactivate Profile check box is
selected.
7. Select the Remove
Profile check box.
8. Click the Apply
button.
The access profile is removed.
Configure port authentication
With port-based authentication, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use
the port without restrictions. At any time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This
is the default authentication mode.
An 802.1X network includes three components:
Authenticator. The port that is authenticated before access to system servic
es is
permitted.
Supplicant. The
host that is connected to the authenticated port requesting access to the
system services.
Authentication Server. The external server
, for example, the RADIUS server that
performs the authentication on behalf of the authenticator, and indicates whether the
supplicant is authorized to access system services.