TP-LINK 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch TL-SL3428 Data Sheet

Product codes
TL-SL3428
Page of 248
 
 
Config 
DoS Protection: 
Allows you to Enable/Disable DoS Defend function. 
 
Defend Table 
Select: 
Select the entry to enable the corresponding Defend Type. 
Defend Type: 
Displays the Defend Type name. 
Tips: 
You are suggested to take the following further steps to ensure the network security. 
1.  It’s recommended to inspect and repair the system vulnerability regularly. It is also necessary 
to install the system bulletins and backup the important information in time. 
2.  The network administrator is suggested to inspect the physic environment of the network and 
block the unnecessary network services. 
3.  Enhance the network security via the protection devices, such as the hardware firewall.   
11.4 802.1X 
The 802.1X protocol was developed by IEEE802 LAN/WAN committee to deal with the security 
issues of wireless LANs. It was then used in Ethernet as a common access control mechanism for 
LAN ports to solve mainly authentication and security problems. 
802.1X is a port-based network access control protocol. It authenticates and controls devices 
requesting for access in terms of the ports of LAN access control devices. With the 802.1X 
protocol enabled, a supplicant can access the LAN only when it passes the authentication, 
whereas those failing to pass the authentication are denied when accessing the LAN.   
 
Architecture of 802.1X Authentication 
802.1X adopts a client/server architecture with three entities: a supplicant system, an 
authenticator system, and an authentication server system, as shown in the following figure. 
 
 
Figure 11-17 Architecture of 802.1X authentication 
1)  Supplicant System: The supplicant system is an entity in LAN and is authenticated by the 
authenticator system. The supplicant system is usually a common user terminal computer. 
160