802.1X Client Software REV1.0.
COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright © 2015 TP-LINK TECHNOLOGIES CO., LTD.
CONTENTS 802.1X Client Software..................................................................................................................... 1 1 Installation.................................................................................................................................... 1 2 Configuration ............................................................................................................................... 2 3 FAQ.............................................................
802.1X Client Software The IEEE 802.1x port-based authentication on the TP-LINK switch prevents unauthorized clients from accessing the network. 802.1x operates in the typical client/server model. When using the TP-LINK switch as the authenticator system, please read this user guide to acquire information about the installation and configuration of the 802.1X Client Software. 1 Installation 1. Typical Topology The 802.
3. Installation The 802.1X Client Software is in the same directory with this User Guide. This software is also available at our official website. Follow the InstallSheild Wizard to accomplish the installation. 2 Configuration 1. After completing installation, double click the icon Software. The following screen will appear. to run the TP-LINK 802.1X Client Figure 1-2 TP-LINK 802.1X Client Enter the Name and the Password for EAP-MD5 or PAP authentication method specified in the Authentication Server.
Figure 1-3 Advanced Setting Authentication Method: EAP-TLS, EAP-TTLS or PEAP authentication method can be selected. Tunnel: The authentication methods adopted for EAP-TTLS or PEAP after the TLS secure tunnel is established. For EAP-TTLS, EAP/MSCHAPV2, EAP/MD5, EAP/GTC, MSCHAPV2, MSCHAP, CHAP and PAP can be selected. For PEAP, EAP/MSCHAPV2, EAP/MD5 and EAP/GTC can be selected. If Anonymous is selected, the clients will use anonymous as the identity to initiate the authentication.
Figure 1-4 Select Certificate Verify Server: Select this option to verify the server certificate. 3. Click the Properties button on Figure B-12 to load the following screen for configuring the connection properties. Figure 1-5 Connection Properties Send 802.1X protocol packets by Unicast: When this option is selected, the Client will send the EAPOL Start packets to the switch via multicast and send the 802.1X authentication packets via unicast.
4. To continue, click Connect button after entering the Name and Password on Figure B-12. Then the following screen will appear to prompt that the Radius server is being searched. Figure 1-6 Authentication Dialog 5. When passing the authentication, the following screen will appear. Figure 1-7 Successfully Authenticated 6. on the right corner of desktop, and then the following connection Double click the icon status screen will pop up.
3 FAQ Q1: Why does this error dialog box pop up when starting up the TP-LINK 802.1X Client Software? A1: It’s because the supported DLL file is missing. You are suggested to go to http://www.winpcap.org to download WinPcap 4.0.2 or the higher version for installation, and run the client software again. Q2: Is this TP-LINK 802.1X Client Software compliable with the switches of the other manufacturers? A2: No. This TP-LINK 802.1X Client Software is customized for TP-LINK switches.