User Manual
Table Of Contents
- M4100 Series Managed Switch
- Contents
- 1. Get Started
- 2. Configure System Information
- System Configuration
- Configure Initial Management VLAN Settings
- Define System Information
- View the Switch Status
- Manage Loopback Interfaces
- View the IPv6 Network Neighbor Table
- Configure an IPv4 Management VLAN
- View or Set the System Time
- Configure DNS
- Configure the DHCP Server
- Configure the DHCP Pool
- Configure UDP Relay Global Settings
- Configure the Basic PoE Settings
- Configure Advanced PoE Settings
- View All MIBs Supported by the Switch
- Configure SNMP v3 Settings for a User
- LLDP Overview
- Configure LLDP Global Settings
- Configure an LLDP Interface
- View LLDP Statistics
- View LLDP Local Device Information
- View LLDP Remote Device Information
- View LLDP Remote Device Inventory
- Configure LLDP-MED Global Settings
- Configure the LLDP-MED Interface
- View LLDP-MED Local Device Information
- View LLDP-MED Remote Device Information
- View LLDP-MED Remote Device Inventory
- ISDP Settings Overview
- Configure Timers
- 3. Configure Switching Information
- VLAN Overview
- Configure a Basic VLAN
- Configure an Internal VLAN
- Add a VLAN
- Reset VLAN Configuration
- Configure Internal VLAN Settings
- Configure VLAN Trunking
- Configure VLAN Membership
- View VLAN Status
- Configure Port PVID
- Configure a MAC-Based VLAN Group
- Configure a Protocol-Based VLAN Group
- Configure Protocol-Based VLAN Group Membership
- Configure an IP Subnet–Based VLAN
- Configure Port DVLAN
- Configure a Voice VLAN
- Configure GARP Switch Settings
- Configure GARP Port Settings
- Auto-VoIP Overview
- Spanning Tree Protocol Overview
- Configure Multicast
- IGMP Snooping Overview
- Configure MLD Snooping
- Configure MVR
- Manage MAC Addresses
- Configure Port Settings
- Link Aggregation Group Overview
- VLAN Overview
- 4. Routing
- 5. Configure Quality of Service
- QoS Overview
- Class of Service
- Differentiated Services
- DiffServ Wizard Overview
- Use the DiffServ Wizard
- Configure DiffServ
- Configure the Global Diffserv Mode
- Configure a DiffServ Class
- Configure the Class Match Criteria
- Configure a DiffServ IPv6 Class
- Configure the DiffServ Class Match Criteria
- Configure DiffServ Policy
- Configure DiffServ Policy Attributes
- Configure DiffServ Policy Settings on an Interface
- View Service Statistics
- 6. Manage Device Security
- Management Security Settings
- Configure RADIUS Settings
- TACACS
- Set Up a Login Authentication List
- Configure Management Access
- Manage Certificates
- Manage Telnet
- Port Authentication Overview
- Traffic Control
- Configure a Private Group
- Private VLAN Overview
- Storm Control Overview
- Control DHCP Snooping Settings
- Configure an IP Source Guard Interface
- Configure Dynamic ARP Inspection
- Access Control List Overview
- Use the ACL Wizard
- Create a MAC ACL
- Configure MAC Rules
- Configure ACL MAC Binding
- View or Delete MAC Bindings
- Configure an IP ACL
- Configure Rules for an IP ACL
- Configure IP Extended Rules
- Configure an IPv6 ACL
- Configure IPv6 Rules
- Configure ACL Interface Bindings
- View or Delete IP ACL Bindings
- View or Delete VLAN ACL Bindings
- 7. Monitoring the System
- 8. Maintenance
- A. Default Settings
- B. Configuration Examples
Configuration Examples
440
M4100 Series Managed Switch
802.1X
Local area networks (LANs) are often deployed in environments that permit unauthorized
devices to be physically attached to the LAN infrastructure, or permit unauthorized users to
attempt to access the LAN through equipment already attached. In such environments, it
might be desirable to restrict access to the services offered by the LAN to those users and
devices that are permitted to use those services.
Port-based network access control makes use of the physical characteristics of LAN
infrastructures in order to provide a means of authenticating and authorizing devices attached
to a LAN port that has point-to-point connection characteristics and of preventing access to
that port in cases in which the authentication and authorization process fails. In this context, a
port is a single point of attachment to the LAN, such as ports of MAC bridges and
associations between stations or access points in IEEE 802.11 wireless LANs.
The IEEE 802.11 standard describes an architectural framework within which authentication
and consequent actions take place. It also establishes the requirements for a protocol
between the authenticator (the system that passes an authentication request to the
authentication server) and the supplicant (the system that requests authentication), as well as
between the authenticator and the authentication server.
The managed switches support a guest VLAN, which allows unauthenticated users limited
access to the network resources.
Note: You can use QoS features to provide rate limiting on the guest VLAN
to limit the network resources the guest VLAN provides.
Another 802.1X feature is the ability to configure a port to enable or disable EAPoL packet
forwarding support. You can disable or enable the forwarding of EAPoL when 802.1X is
disabled on the device.
The ports of an 802.1X authenticator switch provide the means by which it can offer services
to other systems reachable through the LAN. Port-based network access control allows the
operation of a switch’s ports to be controlled in order to ensure that access to its services is
permitted only by systems that are authorized to do so.
Port access control provides a means of preventing unauthorized access by supplicants to
the services offered by a system. Control over the access to a switch and the LAN to which it
is connected can be desirable in order to restrict access to publicly accessible bridge ports or
to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached to an
authenticator's controlled ports. The result of the authentication process determines whether
the supplicant is authorized to access services on that controlled port.
A port access entity (PAE) is able to adopt one of two distinct roles within an access control
interaction: