User Manual
Table Of Contents
- 1. INTRODUTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.2.1 System Information
- 4.2.2 IP Configuration
- 4.2.3 IPv6 Configuration
- 4.2.4 Users Configuration
- 4.2.5 Privilege Levels
- 4.2.6 NTP Configuration
- 4.2.7 UPnP
- 4.2.8 DHCP Relay
- 4.2.9 DHCP Relay Statistics
- 4.2.10 CPU Load
- 4.2.11 System Log
- 4.2.12 Detailed Log
- 4.2.13 Remote Syslog
- 4.2.14 SMTP Configuration
- 4.2.15 Web Firmware Upgrade
- 4.2.16 TFTP Firmware Upgrade
- 4.2.17 Configuration Backup
- 4.2.18 Configuration Upload
- 4.2.19 Image Select
- 4.2.20 Factory Default
- 4.2.21 System Reboot
- 4.3 Simple Network Management Protocol
- 4.4 Port Management
- 4.5 Link Aggregation
- 4.6 VLAN
- 4.6.1 VLAN Overview
- 4.6.2 IEEE 802.1Q VLAN
- 4.6.3 VLAN Basic Information
- 4.6.4 VLAN Port Configuration
- 4.6.5 VLAN Membership
- 4.6.6 VLAN Membership Status
- 4.6.7 VLAN Port Status
- 4.6.8 Private VLAN
- 4.6.9 Port Isolation
- 4.6.10 VLAN setting example:
- 4.6.11 MAC-based VLAN
- 4.6.12 MAC-based VLAN Status
- 4.6.13 IP Subnet-based VLAN
- 4.6.14 Protocol-based VLAN
- 4.6.15 Protocol-based VLAN Mambership
- 4.7 Spanning Tree Protocol
- 4.8 Multicast
- 4.8.1 IGMP Snooping
- 4.8.2 IGMP Snooping Configuration
- 4.8.3 IGMP Snooping VLAN Configuration
- 4.8.4 IGMP Snooping Port Group Filtering
- 4.8.5 IGMP Snooping Status
- 4.8.6 IGMP Group Information
- 4.8.7 IGMPv3 Information
- 4.8.8 MLD Snooping Configuration
- 4.8.9 MLD Snooping VLAN Configuration
- 4.8.10 MLD Snooping Port Group Filtering
- 4.8.11 MLD Snooping Status
- 4.8.12 MLD Group Information
- 4.8.13 MLDv2 Information
- 4.8.14 MVR
- 4.8.15 MVR Status
- 4.8.16 MVR Groups Information
- 4.8.17 MVR SFM Information
- 4.9 Quality of Service
- 4.9.1 Understand QOS
- 4.9.2 Port Policing
- 4.9.3 Port Classification
- 4.9.4 Port Scheduler
- 4.9.5 Port Shaping
- 4.9.6 Port Tag Remarking
- 4.9.7 Port DSCP
- 4.9.8 DSCP-Based QoS
- 4.9.9 DSCP Translation
- 4.9.10 DSCP Classification
- 4.9.11 QoS Control List
- 4.9.12 QoS Status
- 4.9.13 Storm Control Configuration
- 4.9.14 QoS Statistics
- 4.9.15 Voice VLAN Configuration
- 4.9.16 Voice VLAN OUI Table
- 4.10 Access Control Lists
- 4.11 Authentication
- 4.11.1 Understanding IEEE 802.1X Port-Based Authentication
- 4.11.2 Authentication Configuration
- 4.11.3 Network Access Server Configuration
- 4.11.4 Network Access Overview
- 4.11.5 Network Access Statistics
- 4.11.6 Authentication Server Configuration
- 4.11.7 RADIUS Overview
- 4.11.8 RADIUS Details
- 4.11.9 Windows Platform RADIUS Server Configuration
- 4.11.10 802.1X Client Configuration
- 4.12 Security
- 4.12.1 Port Limit Control
- 4.12.2 Access Management
- 4.12.3 Access Management Statistics
- 4.12.4 HTTPs
- 4.12.5 SSH
- 4.12.6 Port Security Status
- 4.12.7 Port Security Detail
- 4.12.8 DHCP Snooping
- 4.12.9 DHCP Snooping Statistics
- 4.12.10 IP Source Guard Configuration
- 4.12.11 IP Source Guard Static Table
- 4.12.12 ARP Inspection
- 4.12.13 ARP Inspection Static Table
- 4.13 Address Table
- 4.14 LLDP
- 4.15 Network Diagnostics
- 4.16 Loop Protection
- 4.17 sFlow
- 4.18 RMON
- 4.18.1 RMON Alarm Configuration
- 4.18.2 RMON Alarm Detail
- 4.18.3 RMON Alarm Status
- 4.18.4 RMON Event Configuration
- 4.18.5 RMON Event Detail
- 4.18.6 RMON Event Status
- 4.18.7 RMON History Configuration
- 4.18.8 RMON History Detail
- 4.18.9 RMON History Status
- 4.18.10 RMON Statistics Configuration
- 4.18.11 RMON Statistics Detail
- 4.18.12 RMON Statistics Status
- 5. COMMAND LINE INTERFACE
- 6. Command Line Mode
- 6.1 System Command
- 6.2 IP Command
- 6.3 Port Management Command
- 6.4 MAC Address Table Command
- 6.5 VLAN Configuration Command
- 6.6 Private VLAN Configuration Command
- 6.7 Security Command
- Security Switch User Configuration
- Security Switch User Add
- Security Switch User Delete
- Security Switch Privilege Level Configuration
- Security Switch Privilege Level Group
- Security Switch Privilege Level Current
- Security Switch Authentication Configuration
- Security Switch Authentication Method
- Security Switch SSH Configuration
- Security Switch SSH Mode
- Security Switch HTTPs Configuration
- Security Switch HTTPs Mode
- Security Switch HTTPs Redirect
- Security Switch Access Configuration
- Security Switch Access Mode
- Security Switch Access Add
- Security Switch Access IPv6 Add
- Security Switch Access Delete
- Security Switch Access Lookup
- Security Switch Access Clear
- Security Switch Access Statistics
- Security Switch SNMP Configuration
- Security Switch SNMP Mode
- Security Switch SNMP Version
- Security Switch SNMP Read Community
- Security Switch SNMP Write Community
- Security Switch SNMP Trap Mode
- Security Switch SNMP Trap Version
- Security Switch SNMP Trap Community
- Security Switch SNMP Trap Destination
- Security Switch SNMP Trap IPv6 Destination
- Security Switch SNMP Trap Authentication Failure
- Security Switch SNMP Trap Link-up
- Security Switch SNMP Trap Inform Mode
- Security Switch SNMP Trap Inform Timeout
- Security Switch SNMP Trap Inform Retry Times
- Security Switch SNMP Trap Probe Security Engine ID
- Security Switch SNMP Trap Security Engine ID
- Security Switch SNMP Trap Security Name
- Security Switch SNMP Engine ID
- Security Switch SNMP Community Add
- Security Switch SNMP Community Delete
- Security Switch SNMP Community Lookup
- Security Switch SNMP User Add
- Security Switch SNMP User Delete
- Security Switch SNMP User Changekey
- Security Switch SNMP User Lookup
- Security Switch SNMP Group Add
- Security Switch SNMP Group Delete
- Security Switch SNMP Group Lookup
- Security Switch SNMP View Add
- Security Switch SNMP View Delete
- Security Switch SNMP View Lookup
- Security Switch SNMP Access Add
- Security Switch SNMP Access Delete
- Security Switch SNMP Access Lookup
- Security Switch RMON Statistics Add
- Security Switch RMON Statistics Delete
- Security Switch RMON Statistics Lookup
- Security Switch RMON History Add
- Security Switch RMON History Delete
- Security Switch RMON History Lookup
- Security Switch RMON Alarm Add
- Security Switch RMON Alarm Delete
- Security Switch RMON Alarm Lookup
- Security Switch RMON Event Add
- Security Switch RMON Event Delete
- Security Switch RMON Event Lookup
- Security Network Psec Switch
- Security Network Psec Port
- Security Network Limit Configuration
- Security Network Limit Mode
- Security Network Limit Aging
- Security Network Limit Agetime
- Security Network Limit Port
- Security Network Limit Limit
- Security Network Limit Action
- Security Network Limit Reopen
- Security Network NAS Configuration
- Security Network NAS Mode
- Security Network NAS State
- Security Network NAS Reauthentication
- Security Network NAS ReauthPeriod
- Security Network NAS EapolTimeout
- Security Network NAS Agetime
- Security Network NAS Holdtime
- Security Network NAS RADIUS_QoS
- Security Network NAS RADIUS_VLAN
- Security Network NAS Guest_VLAN
- Security Network NAS Authenticate
- Security Network NAS Statistics
- Security Network ACL Configuration
- Security Network ACL Action
- Security Network ACL Policy
- Security Network ACL Rate
- Security Network ACL Add
- Security Network ACL Delete
- Security Network ACL Lookup
- Security Network ACL Clear
- Security Network ACL Status
- Security Network ACL Port State
- Security Network DHCP Relay Configuration
- Security Network DHCP Relay Mode
- Security Network DHCP Relay Server
- Security Network DHCP Relay Information Mode
- Security Network DHCP Relay Information Policy
- Security Network DHCP Relay Statistics
- Security Network DHCP Snooping Configuration
- Security Network DHCP Snooping Mode
- Security Network DHCP Snooping Port Mode
- Security Network DHCP Snooping Statistics
- Security Network IP Source Guard Configuration
- Security Network IP Source Guard Mode
- Security Network IP Source Guard Port Mode
- Security Network IP Source Guard Limit
- Security Network IP Source Guard Entry
- Security Network IP Source Guard Status
- Security Network IP Source Guard Translation
- Security Network ARP Inspection Configuration
- Security Network ARP Inspection Mode
- Security Network ARP Inspection Port Mode
- Security Network ARP Inspection Entry
- Security Network ARP Inspection Status
- Security Network ARP Inspection Translation
- Security AAA Configuration
- Security AAA Timeout
- Security AAA Deadtime
- Security AAA RADIUS
- Security AAA ACCT_RADIUS
- Security AAA TACACS+
- Security AAA Statistics
- 6.8 Spanning Tree Protocol Command
- STP Configuration
- STP Version
- STP Tx Hold
- STP MaxHops
- STP MaxAge
- STP FwdDelay
- STP CName
- STP BPDU Filter
- STP BPDU Guard
- STP Recovery
- STP Status
- STP MSTI Priority
- STP MSTI Map
- STP MSTI Add
- STP Port Configuration
- STP Port Mode
- STP Port Edge
- STP Port AutoEdge
- STP Port P2P
- STP Port RestrictedRole
- STP Port RestrictedTcn
- STP Port bpduGuard
- STP Port Statistic
- STP Port Mcheck
- STP MSTI Port Configuration
- STP MSTI Port Cost
- STP MSTI Port Priority
- 6.9 Link Aggregation Command
- 6.10 Link Aggregation Control Protocol Command
- 6.11 LLDP Command
- 6.12 LLDPMED Command
- 6.13 Quality of Service Command
- QoS Configuration
- QoS Port Classification Class
- QoS Port Classification DPL
- QoS Port Classification Tag
- QoS Port Classification Map
- QoS Port Classification DSCP
- QoS Port Policer Mode
- QoS Port Policer Rate
- QoS Port Policer Unit
- QoS Port Policer Flow Control
- QoS Port Scheduler Mode
- QoS Port Scheduler Weight
- QoS Port QueueShaper Mode
- QoS Port QueueShaper Rate
- QoS Port QueueShaper Excess
- QoS Port TagRemarking Mode
- QoS Port TagRemarking PCP
- QoS Port TagRemarking DEI
- QoS Port TagRemarking Map
- QoS Port DSCP Translation
- QoS Port DSCP Classification
- QoS Port DSCP EgressRemark
- QoS DSCP Map
- QoS DSCP Translation
- QoS DSCP Trust
- QoS DSCP Classification Mode
- QoS DSCP Classification MAP
- QoS DSCP EgressRemap
- QoS Port Storm Unicast
- QoS Port Storm Multicast
- QoS Port Storm Broadcast
- QoS QCL Add
- QoS QCL Delete
- QoS QCL Lookup
- QoS QCL Status
- QoS QCL Refresh
- 6.14 Mirror Command
- 6.15 Configuration Command
- 6.16 Firmware Command
- 6.17 UPnP Command
- 6.18 MVR Command
- 6.19 Voice VLAN Command
- 6.20 Loop Protect Command
- 6.21 IPMC Command
- IPMC Configuration
- IPMC Mode
- IPMC Flooding
- IPMC Leave Proxy
- IPMC Proxy
- IPMC SSM
- IPMC VLAN Add
- IPMC VLAN Delete
- IPMC State
- IPMC Querier
- IPMC Compatibility
- IPMC Fastleave
- IPMC Throttling
- IPMC Filtering
- IPMC Router
- IPMC Status
- IPMC Groups
- IPMC Version
- IPMC SFM
- IPMC Parameter RV
- IPMC Parameter QI
- IPMC Parameter QRI
- IPMC Parameter LLQI
- IPMC Parameter URI
- 6.22 sFlow Command
- 6.23 VLAN Control List Command
- VCL MAC-based VLAN Configuration
- VCL MAC-based VLAN Add
- VCL MAC-based VLAN Delete
- VCL Stasus
- VCL Protocol-based VLAN Add Ethernet II
- VCL Protocol-based VLAN Add SNAP
- VCL Protocol-based VLAN Add LLC
- VCL Protocol-based VLAN Delete Ethernet II
- VCL Protocol-based VLAN Delete SNAP
- VCL Protocol-based VLAN Delete LLC
- VCL Protocol-based VLAN Add
- VCL Protocol-based VLAN Delete
- VCL Protocol-based VLAN Configuration
- VCL IP-based VLAN Configuration
- VCL IP-based VLAN Add
- VCL IP-based VLAN Delete
- 6.24 SMTP Command
- 7. SWITCH OPERATION
- 8. TROUBLE SHOOTING
- APPENDEX A
- APPENDEX B : GLOSSARY
- EC Declaration of Conformity
User’s Manual of WGSW-24040 / WGSW-24040R
4.11 Authentication
This section is to control the access of the Managed Switch, includes the user access and management control.
The Authentication section contains links to the following main topics:
IEEE 802.1X Port-Based Network Access Control
MAC-Based Authentication
User Authentication
Overview of 802.1X (Port-Based) Authentication
In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the
authentication server. The switch acts as the man-in-the-middle, forwarding requests and responses between the supplicant
and the authentication server. Frames sent between the supplicant and the switch are special 802.1X frames, known as EAPOL
(EAP Over LANs) frames. EAPOL frames encapsulate EAP PDUs (RFC3748). Frames sent between the switch and the
RADIUS server are RADIUS packets. RADIUS packets also encapsulate EAP PDUs together with other attributes like the
switch's IP address, name, and the supplicant's port number on the switch. EAP is very flexible, in that it allows for different
authentication methods, like MD5-Challenge, PEAP, and TLS. The important thing is that the authenticator (the switch) doesn't
need to know which authentication method the supplicant and the authentication server are using, or how many information
exchange frames are needed for a particular method. The switch simply encapsulates the EAP part of the frame into the
relevant type (EAPOL or RADIUS) and forwards it.
When authentication is complete, the RADIUS server sends a special packet containing a success or failure indication. Besides
forwarding this decision to the supplicant, the switch uses it to open up or block traffic on the switch port connected to the
supplicant.
Overview of MAC-Based Authentication
Unlike 802.1X, MAC-based authentication is not a standard, but merely a best-practices method adopted by the industry. In
MAC-based authentication, users are called clients, and the switch acts as the supplicant on behalf of clients. The initial frame
(any kind of frame) sent by a client is snooped by the switch, which in turn uses the client's MAC address as both username and
password in the subsequent EAP exchange with the RADIUS server. The 6-byte MAC address is converted to a string on the
following form "xx-xx-xx-xx-xx-xx", that is, a dash (-) is used as separator between the lower-cased hexadecimal digits. The
switch only supports the MD5-Challenge authentication method, so the RADIUS server must be configured accordingly.
When authentication is complete, the RADIUS server sends a success or failure indication, which in turn causes the switch to
open up or block traffic for that particular client, using static entries into the MAC Table. Only then will frames from the client be
forwarded on the switch. There are no EAPOL frames involved in this authentication, and therefore, MAC-based Authentication
has nothing to do with the 802.1X standard.
The advantage of MAC-based authentication over 802.1X is that several clients can be connected to the same port (e.g. through
a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software
222