252
The Page includes the following fields:
Object
Description
Client
The management client for which the configuration below applies.
Authentication Method
Authentication Method can be set to one of the following values:
■
None
: authentication is disabled and login is not possible.
■
Local
: use the local user database on the switch stack for authentication.
■
RADIUS
: use a remote RADIUS server for authentication.
■
: use a remote server for authentication.
Methods that involves remote servers are timed out if the remote servers are
offline. In this case the next method is tried. Each method is tried from left to right
and continues until a method either approves or rejects a user. If a remote server
is used for primary authentication it is recommended to configure secondary
authentication as 'local'. This will enable the management client to login via the
local user database if none of the configured authentication servers are alive.
Buttons
: Click to apply changes
: Click to undo any changes made locally and revert to previously saved values.
4.11.3 Network Access Server Configuration
This Page allows you to configure the IEEE 802.1X and MAC-based authentication system and port settings.
The IEEE 802.1X standard defines a port-based access control procedure that prevents unauthorized access to a network by
requiring users to first submit credentials for authentication. One or more central servers, the backend servers, determine whether
the user is allowed access to the network. These backend (RADIUS) servers are configured on the "Configuration
→
Security
→
AAA"
Page. The IEEE802.1X standard defines port-based operation, but non-standard variants overcome security limitations as shall be
explored below.
MAC-based authentication allows for authentication of more than one user on the same port, and doesn't require the user to have
special 802.1X supplicant software installed on his system. The switch uses the user's MAC address to authenticate against the
backend server. Intruders can create counterfeit MAC addresses, which makes MAC-based authentication less secure than 802.1X
authentication. The NAS configuration consists of two sections, a system- and a port-wide. The Network Access Server
Configuration screen in
Figure 4-11-4
appears.
Summary of Contents for NS3702-24P-4S
Page 1: ...NS3702 24P 4S User Manual P N 1072832 REV 00 01 ISS 14JUL14 ...
Page 102: ...102 Figure 4 5 4 LACP Port Configuration Page Screenshot ...
Page 119: ...119 Figure 4 6 4 VLAN Membership Status for Static User Page Screenshot ...
Page 124: ...124 Figure 4 6 6 Private VLAN Membership Configuration page screenshot ...
Page 140: ...140 Figure 4 6 21 Group Name to VLAN Mapping Table Page Screenshot ...
Page 164: ...164 Figure 4 8 2 Multicast Flooding ...
Page 184: ...184 Figure 4 8 15 MLD Snooping Port Group Filtering Configuration Page Screenshot ...
Page 204: ...204 Figure 4 9 6 QoS Egress Port Tag Remarking Page Screenshot ...
Page 209: ...209 QoS Class QoS Class value can be any of 0 7 DPL Drop Precedence Level 0 1 ...
Page 251: ...251 Figure 4 11 3 Authentication Method Configuration Page Screenshot ...
Page 286: ...286 Figure 4 11 11 RADIUS Server Configuration Screenshot ...
Page 290: ...290 Figure 4 11 17 Add User Properties Screen Figure 4 11 18 Add User Properties Screen ...
Page 298: ...298 non committed changes will be lost ...
Page 349: ...349 Figure 4 16 2 PoE Configuration Screenshot ...