User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.3 Port Management
- 4.4 Link Aggregation
- 4.5 VLAN
- 4.6 Spanning Tree Protocol
- 4.7 Multicast
- 4.8 Quality of Service
- 4.9 Security
- 4.10 ACL
- 4.11 MAC Address Table
- 4.12 LLDP
- 4.13 Diagnostics
- 4.14 Power over Ethernet
- 4.15 RMON
- 4.16 Maintenance
- 5. COMMAND LINE INTERFACE
- 6. Command Line Mode
- 6.1 User Mode Commands
- 6.2 Privileged Mode Commands
- 6.2.1 clear command
- 6.2.2 clock command
- 6.2.3 configure command
- 6.2.4 copy command
- 6.2.5 debug command
- 6.2.6 delete command
- 6.2.7 disable command
- 6.2.8 end command
- 6.2.9 exit command
- 6.2.10 no command
- 6.2.11 ping command
- 6.2.12 reboot command
- 6.2.13 renew command
- 6.2.14 restore-defaults command
- 6.2.15 save command
- 6.2.16 show command
- 6.2.17 ssl command
- 6.2.18 traceroute command
- 6.2.19 udld command
- 6.3 Global Config Mode Commands
- 6.3.1 aaa Command
- 6.3.2 boot Command
- 6.3.3 bridge Command
- 6.3.4 class-map Command
- 6.3.5 clock Command
- 6.3.6 dos Command
- 6.3.7 dot1x Command
- 6.3.8 do Command
- 6.3.9 enable Command
- 6.3.10 end Command
- 6.3.11 errdisable Command
- 6.3.12 exit Command
- 6.3.13 gvrp Command
- 6.3.14 hostname Command
- 6.3.15 interface Command
- 6.3.16 ip Command
- 6.3.17 ipv6 Command
- 6.3.18 jumbo-frame Command
- 6.3.19 l2 Command
- 6.3.20 lacp Command
- 6.3.21 lag Command
- 6.3.22 line Command
- 6.3.23 lldp Command
- 6.3.24 logging Command
- 6.3.25 mac Command
- 6.3.26 management-VLAN Command
- 6.3.27 mirror Command
- 6.3.28 no Command
- 6.3.29 policy-map Command
- 6.3.30 port-security Command
- 6.3.31 qos Command
- 6.3.32 radius Command
- 6.3.33 rate-limit Command
- 6.3.34 rmon Command
- 6.3.35 Snmp Command
- 6.3.36 sntp Command
- 6.3.37 spanning-tree Command
- 6.3.38 storm-control Command
- 6.3.39 system Command
- 6.3.40 tacacs Command
- 6.3.41 udld Command
- 6.3.42 username Command
- 6.3.43 vlan Command
- 6.3.44 voice-vlan Command
- 7. SWITCH OPERATION
- 8. POWER OVER ETHERNET OVERVIEW
- 9. TROUBLESHOOTING
- APPENDIX A
- EC Declaration of Conformity
User’s Manual of GS-4210-24P2S
The page includes the following fields:
Object Description
Port
The switch port number of the logical port.
Port State
Display the current port state.
Broadcast (16Kbps)
Display the current brocast storm control rate.
Unknown Multicast
(16Kbps)
Display the current unknown multicast storm control rate.
Unknown Unicast
(16Kbps)
Display the current unknown unicast storm control rate.
Displ
ay the current action.
Action
4.9.2 802.1X
Overview of 802.1X (Port-based) Authentication
In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the
authentication server. The switch acts as the man-in-the-middle, forwarding requests and responses between the supplicant
and the authentication server. Frames sent between the supplicant and the switch are special 802.1X frames, known as EAPOL
(EAP Over LANs) frames. EAPOL frames encapsulate EAP PDUs (RFC3748). Frames sent between the switch and the
RADIUS server are RADIUS packets. RADIUS packets also encapsulate EAP PDUs together with other attributes like the
switch's IP address, name, and the supplicant's port number on the switch. EAP is very flexible, in that it allows for different
authentication methods, like MD5-Challenge, PEAP, and TLS. The important thing is that the authenticator (the switch) doesn't
need to know which authentication method the supplicant and the authentication server are using, or how many information
exchange frames are needed for a particular method. The switch simply encapsulates the EAP part of the frame into the
relevant type (EAPOL or RADIUS) and forwards it.
When authentication is complete, the RADIUS server sends a special packet containing a success or failure indication. Besides
forwarding this decision to the supplicant, the switch uses it to open up or block traffic on the switch port connected to the
supplicant.
Overview of User Authentication
It is allowed to configure the PoE Managed Switch to authenticate users logging into the system for management access using
local or remote authentication methods, such as telnet and Web browser. This PoE Managed Switch provides secure network
management access using the following options:
Remote Authentication Dial-in User Service (RADIUS)
Terminal Access Controller Access Control System Plus (TACACS+)
Local user name and Priviledge Level control
195