TP-Link TL-SL5428E User Guide - Page 175
TP-Link TL-SL5428E Manual
UPC - 845973020873
View all TP-Link TL-SL5428E manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 175 highlights
Figure 13-18 DoS Detect The following entries are displayed on this screen: ¾ Detect Config Detect Time: Specify the detect time for each DoS attack type except the flooding attack type. Detect: Click the Detect button to start the detection. The switch will detect each type of the DoS attack in turn. ¾ Detect Result Port: Display the port number. Attack Type: Displays the Attack Type name. Attack Count: Displays the count of the attack. Tips: You are suggested to take the following further steps to ensure the network security. 3. It's recommended to inspect and repair the system vulnerability regularly. It is also necessary to install the system bulletins and backup the important information in time. 4. The network administrator is suggested to inspect the physic environment of the network and block the unnecessary network services. 5. Enhance the network security via the protection devices, such as the hardware firewall. 13.5 802.1X The 802.1X protocol was developed by IEEE802 LAN/WAN committee to deal with the security issues of wireless LANs. It was then used in Ethernet as a common access control mechanism for LAN ports to solve mainly authentication and security problems. 802.1X is a port-based network access control protocol. It authenticates and controls devices requesting for access in terms of the ports of LAN access control devices. With the 802.1X protocol enabled, a supplicant can access the LAN only when it passes the authentication, whereas those failing to pass the authentication are denied when accessing the LAN. ¾ Architecture of 802.1X Authentication 802.1X adopts a client/server architecture with three entities: a supplicant system, an authenticator system, and an authentication server system, as shown in the following figure. 167