User Manual
Table Of Contents
- S350 Series 8-Port Gigabit Ethernet Smart Switch
- Contents
- 1 Get Started
- Available Publications
- Switch Management and Discovery Overview
- Options to Change the Default IP Address of the Switch
- Discover or Change the Switch IP Address
- About the User Interfaces
- Access the Local Browser Interface
- Change the Language of the Local Browser Interface
- Use the Device View of the Local Browser Interface
- Interface Naming Conventions
- Configure Interface Settings
- Context-Sensitive Help and Access to the Support WebSite
- Access the User Guide Online
- Register Your Product
- 2 Configure System Information
- 3 Configure Switching
- Configure the Port Settings and Maximum Frame Size
- Configure Link Aggregation Groups
- Configure VLANs
- Configure a Voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure Multicast
- View and Search the MFDB Table
- View the MFDB Statistics
- Configure the Auto-Video Multicast Settings
- About IGMP Snooping
- Configure IGMP Snooping
- Configure IGMP Snooping for Interfaces
- View, Search, or Clear the IGMP Snooping Table
- Configure IGMP Snooping for VLANs
- Modify IGMP Snooping Settings for a VLAN
- Disable IGMP Snooping on a VLAN
- Configure a Multicast Router Interface
- Configure a Multicast Router VLAN
- IGMP Snooping Querier Overview
- Configure an IGMP Snooping Querier
- Configure an IGMP Snooping Querier for VLANs
- Display IGMP Snooping Querier for VLAN Status
- View, Search, and Manage the MAC Address Table
- Configure Layer 2 Loop Protection
- 4 Configure Quality of Service
- 5 Manage Device Security
- Configure the Management Security Settings
- Configure Management Access
- Configure Port Authentication
- Set Up Traffic Control
- Configure Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure a Basic MAC ACL
- Configure MAC ACL Rules
- Configure MAC Bindings
- View or Delete MAC ACL Bindings in the MAC Binding Table
- Configure a Basic or Extended IP ACL
- Configure Rules for a Basic IP ACL
- Configure Rules for an Extended IP ACL
- Configure IP ACL Interface Bindings
- View or Delete IP ACL Bindings in the IP ACL Binding Table
- Configure VLAN ACL Bindings
- 6 Monitor the System
- 7 Maintenance
- A Configuration Examples
- B Specifications and Default Settings
S350 Series 8-Port Gigabit Ethernet Smart Switch Models GS308T and GS310TP
Manage Device Security User Manual233
- Authorized. The switch places the interface into an authorized state without
being authenticated. The interface sends and receives normal traffic without client
port-based authentication.
- Unauthorized.
The switch denies the selected interface system access by
moving the interface into unauthorized state. The switch cannot provide
authentication services to the client through the interface.
- MAC based.
This mode allows multiple supplicants connected to the same port to
each authenticate individually. Each host connected to the port must authenticate
separately in order to gain access to the network. The hosts are distinguished by
their MAC addresses.
• Guest VLAN ID. Specify the VLAN ID for the guest VLAN.
The range is from 0 to
4093. The default value is 0. Enter 0 to reset the guest VLAN ID on the interface. The
guest VLAN allows the port to provide a distinguished service to unauthenticated
users, after three authentication failures. This feature provides a mechanism to allow
users access to hosts on the guest VLAN.
• Guest VLAN Period. Specify the time in seconds that the selected port remains in
the quiet state following a failed authentication exchange.
The guest VLAN time-out
must be a value in the range from 1 to 300. The default value is 90.
• Unauthenticated VLAN ID. Specify the VLAN ID of the unauthenticated VLAN for the
selected port.
The range is from 0 to 3965. The default value is 0. Hosts that fail the
authentication might be denied access to the network or placed on a VLAN created
for unauthenticated clients. This VLAN might be configured with limited network
access.
• Periodic Reauthentication. Select Enable to allow periodic reauthentication of the
supplicant for the specified port.
• Reauthentication Period. Specify the time in seconds after which reauthentication of
the supplicant occurs.
The reauthentication period must be a value in the range from
1 to 65535. The default value is 3600. If this field is disabled, connected clients are
not forced to reauthenticate periodically.
• Quiet Period. Specify the time in seconds that the port remains in the quiet state
following a failed authentication exchange. While in the quite state, the port does not
attempt to acquire a supplicant.
• Resending EAP. Specify the EAP retransmit period for the selected port.
The
transmit period is the time in seconds, after which an EAPoL EAP Request/Identify
frame is resent to the supplicant.
• MAX EAP Requests. Specify the maximum number of EAP requests for the selected
port.
The value is the maximum number of times an EAPoL EAP Request/Identity
message is retransmitted before the supplicant times out.
• Supplicant Timeout. Specify the supplicant time-out for the selected port.
The
supplicant time-out is the time in seconds after which the supplicant times out.
• Server Timeout. Specify the time that elapses before the switch resends a request to
the authentication server
.
9. Click the Apply button.
Your settings are saved.










