Netgear GS748Tv5 - ProSAFE 48-port Gigabit Smart Switch Guia Do Administrador

Página de 290
Managing Device Security
195
 GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
3.
In the VLAN Assignment Mode field, select Enable
When enabled, this feature allows a port to be placed into a particular VLAN based on the 
result of the authentication or type of 802.1X authentication a client uses when it 
accesses the device. The authentication server can provide information to the device 
about which VLAN to assign the supplicant.
4.
Next to Dynamic VLAN Creation Mode, select Enable.
If RADIUS-assigned VLANs are enabled, the RADIUS server is expected to include the 
VLAN ID in the 802.1X tunnel attributes of its response message to the device. If dynamic 
VLAN creation is enabled on the device and the RADIUS-assigned VLAN does not exist, 
then the assigned VLAN is dynamically created. This implies that the client can connect 
from any port and can get assigned to the appropriate VLAN. This feature gives flexibility 
for clients to move around the network without much additional configuration required.
5.
Next to EAPOL Flood Mode, select Enable.
Extensible Authentication Protocol (EAP) over LAN (EAPOL) flood support is enabled on 
the switch.
6.
Click the Apply button.
Port Authentication
Use the Port Authentication screen to enable and configure port access control on one or 
more ports.
To configure 802.1X settings for the port:
1.
Select Security 
>
 Port Authentication > Advanced 
>
 Port Authentication.
Note:
Use the horizontal scroll bar at the bottom of the browser to view all 
the fields on the Port Authentication screen.
2.
Select one or more ports to configure.
For information about how to select and configure one or more ports, see 
3.
Specify the following settings:
Port Control. Defines the port authorization state. The control mode is set only if the 
link status of the port is link up. Select one of the following options:
-     
Auto. The system automatically detects the mode of the interface.
-     
Authorized. The system places the interface into an authorized state without 
being authenticated. The interface sends and receives normal traffic without client 
port-based authentication.