TP-Link T1500G-10MPS T1500G-10MPSUN V1 User Guide - Page 178

Operation, Description, Network Security, Global, Config, Conifg, RADIUS, Server Conifg, Overview,

Page 178 highlights

Step Operation Description 2 Configure the 802.1X globally. Required. By default, the global 802.1X function is disabled. On the Network Security→802.1X→Global Config page, configure the 802.1X function globally. 3 Configure the 802.1X for the Required. On the Network Security→802.1X→Port port. Config page, configure the 802.1X feature for the port of the switch basing on the actual network. 4 Connect an authentication Required. Record the information of the client in the LAN server to the switch and do to the authentication server and configure the some configuration. corresponding authentication username and password for the client. 5 Enable the AAA function Required. On the Network Security→AAA→Global globally. Conifg page, enable the AAA function globally. 6 Configure the parameters of Required. On the Network Security→AAA→RADIUS the authentication server. Server Conifg page, configure the parameters of the RADIUS server. Note: 1. The 802.1X function takes effect only when it is enabled globally on the switch and for the port. 2. The 802.1X function cannot be enabled for LAG member ports. That is, the port with 802.1X function enabled cannot be added to the LAG. 3. The 802.1X function should not be enabled for the port connected to the authentication server. 12.6 AAA  Overview AAA stands for authentication, authorization and accounting. This feature is used to authenticate users trying to log in to the switch or trying to access the administrative level privilege. Username and password pairs are used for login and privilege authentication. The authentication can be processed locally in the switch or centrally in the RADIUS/TACACS+ server(s). The local authentication username and password pairs can be configured in 4.2 User Management.  Applicable Access Application The authentication can be applied on the following access applications: Console, Telnet, SSH and HTTP.  Authentication Method List A method list describes the authentication methods and their sequence to authenticate a user. The switch supports Login List for users to gain access to the switch, and Enable List for normal users to gain administrative privileges. The administrator can set the authentication methods in a preferable order in the list. The switch uses the first listed method to authenticate users, if that method fails to respond, the switch selects the next authentication method in the method list. This process continues until there is a successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this circle, which means the secure server or the 169

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

169
Step
Operation
Description
2
Configure the 802.1X globally.
Required. By default, the global 802.1X function is
disabled. On the
Network Security
802.1X
Global
Config
page, configure the 802.1X function globally.
3
Configure the 802.1X for the
port.
Required. On the
Network Security
802.1X
Port
Config
page, configure the 802.1X feature for the port of
the switch basing on the actual network.
4
Connect
an
authentication
server to the switch and do
some configuration.
Required. Record the information of the client in the LAN
to
the
authentication
server
and
configure
the
corresponding authentication username and password for
the client.
5
Enable
the
AAA
function
globally.
Required. On the
Network Security
AAA
Global
Conifg
page, enable the AAA function globally.
6
Configure the parameters of
the authentication server.
Required. On the
Network Security
AAA
RADIUS
Server Conifg
page, configure the parameters of the
RADIUS server.
Note:
1.
The 802.1X function takes effect only when it is enabled globally on the switch and for the
port.
2.
The 802.1X function cannot be enabled for LAG member ports. That is, the port with 802.1X
function enabled cannot be added to the LAG.
3.
The 802.1X function should not be enabled for the port connected to the authentication
server.
12.6
AAA
Overview
AAA stands for authentication, authorization and accounting. This feature is used to authenticate
users trying to log in to the switch or trying to access the administrative level privilege.
Username and password pairs are used for login and privilege authentication. The authentication
can be processed locally in the switch or centrally in the RADIUS/TACACS+ server(s). The local
authentication username and password pairs can be configured in
4.2 User Management
.
Applicable Access Application
The authentication can be applied on the following access applications: Console, Telnet, SSH and
HTTP.
Authentication Method List
A method list describes the authentication methods and their sequence to authenticate a user. The
switch supports Login List for users to gain access to the switch, and Enable List for normal users
to gain administrative privileges.
The administrator can set the authentication methods in a preferable order in the list. The switch
uses the first listed method to authenticate users, if that method fails to respond, the switch selects
the next authentication method in the method list. This process continues until there is a
successful communication with a listed authentication method or until all defined methods are
exhausted. If authentication fails at any point in this circle, which means the secure server or the