User Manual

Table Of Contents
8-Port or 16-Port Gigabit Smart Managed Pro Switch Model GS418TPP, GS510TLP, and GS510TPP
Manage Device Security User Manual320
Remove an access profile
You can remove an access profile that you no longer need. Before you can remove the
access profile, you must deactivate it (see
Deactivate an access profile on page 319).
To remove an access profile:
1. Connect your computer to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.
2. Launch a web browser.
3. In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see
Change the default IP address of the
switch on page 13.
The login window opens.
4. Enter the switch’s password in the Password
field.
The default password is password.
The System Information page displays.
5. Select Security
> Access
> Access Control > Access Profile Configuration.
The Access Profile Configuration page displays. The Deactivate Profile check box is
selected.
6. Select the Remove Profile check box.
7. Click the Apply button.
The access profile is removed.
Configure port authentication
With port-based authentication, when 802.1X is enabled globally and on the port, successful
authentication of any one supplicant attached to the port results in all users being able to use
the port without restrictions. At any given time, only one supplicant is allowed to attempt
authentication on a port in this mode. Ports in this mode are under bidirectional control. This
is the default authentication mode.
An 802.1X network includes three components:
Authenticators. The port that is authenticated before system access is permitted.
Supplicants. The host connected to the authenticated port requesting access to the
system services.
Authentication Server. The external server
, for example, the RADIUS server that
performs the authentication on behalf of the authenticator, and indicates whether the user
is authorized to access system services.