TP-Link T1700G-28TQ T1700G-28TQ V1 User Guide - Page 225

Port Config

Page 225 highlights

The following entries are displayed on this screen:  Global Config 802.1X: Auth Method: Handshake: Enable/Disable the 802.1X function. Select the Authentication Method from the pull-down list.  EAP: IEEE 802.1X authentication system uses extensible authentication protocol (EAP) to exchange information between the switch and the client. The EAP protocol packets with authentication data can be encapsulated in the advanced protocol (such as RADIUS) packets to be transmitted to the authentication server.  PAP: IEEE 802.1X authentication system uses extensible authentication protocol (EAP) to exchange information between the switch and the client. The transmission of EAP packets is terminated at the switch and the EAP packets are converted to the other protocol (such as RADIUS) packets for transmission. Enable/Disable the Handshake feature. The Handshake feature is used to detect the connection status of the TP-LINK 802.1X Client with the switch. Please disable Handshake feature if you are using other client software instead of TP-LINK 802.1X Client. Guest VLAN: Guest VLAN ID: Enable/Disable the Guest VLAN feature. Enter your desired VLAN ID to enable the Guest VLAN feature. The supplicants in the Guest VLAN can access the specified network source.  Authentication Config Quiet: Quiet Period: Retry Times: Supplicant Timeout: Server Timeout: Enable/Disable the Quiet timer. Specify a value for Quiet Period. Once the supplicant failed to the 802.1X Authentication, then the switch will not respond to the authentication request from the same supplicant during the Quiet Period. Specify the maximum transfer times of the repeated authentication request. Specify the maximum time for the switch to wait for the response from supplicant before resending a request to the supplicant. Specify the maximum time for the switch to wait for the response from authentication server before resending a request to the authentication server. 13.5.2 Port Config On this page, you can configure the 802.1X features for the ports basing on the actual network. 215

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

215
The following entries are displayed on this screen:
Global Config
802.1X:
Enable/Disable the 802.1X function.
Auth Method:
Select the Authentication Method from the pull-down list.
EAP:
IEEE
802.1X
authentication
system
uses
extensible authentication protocol (EAP) to exchange
information between the switch and the client. The EAP
protocol packets with authentication data can be
encapsulated in the advanced protocol (such as
RADIUS) packets to be transmitted to the authentication
server.
PAP:
IEEE
802.1X
authentication
system
uses
extensible authentication protocol (EAP) to exchange
information between the switch and the client. The
transmission of EAP packets is terminated at the switch
and the EAP packets are converted to the other protocol
(such as RADIUS) packets for transmission.
Handshake:
Enable/Disable the Handshake feature. The Handshake
feature is used to detect the connection status of the
TP-LINK 802.1X Client with the switch. Please disable
Handshake feature if you are using other client software
instead of TP-LINK 802.1X Client.
Guest VLAN:
Enable/Disable the Guest VLAN feature.
Guest VLAN ID:
Enter your desired VLAN ID to enable the Guest VLAN
feature. The supplicants in the Guest VLAN can access the
specified network source.
Authentication Config
Quiet:
Enable/Disable the Quiet timer.
Quiet Period:
Specify a value for Quiet Period. Once the supplicant failed
to the 802.1X Authentication, then the switch will not
respond to the authentication request from the same
supplicant during the Quiet Period.
Retry Times:
Specify the maximum transfer times of the repeated
authentication request.
Supplicant Timeout:
Specify the maximum time for the switch to wait for the
response from supplicant before resending a request to
the supplicant.
Server Timeout:
Specify the maximum time for the switch to wait for the
response from authentication server before resending a
request to the authentication server.
13.5.2 Port Config
On this page, you can configure the 802.1X features for the ports basing on the actual network.