Manage port authentication – NETGEAR MS510TXPP 8 Port Gigabit PoE Managed Switch User Manual
Page 245
Smart Managed Pro Switches MS510TX and MS510TXPP
Manage Device Security
User Manual
245
Manage Port Authentication
Use the Port Authentication page to enable and configure port access control on one or more
ports.
Configure 802.1X Settings for a Port
To configure 802.1X settings for a port:
1.
Connect your computer to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.
2.
Launch a web browser.
3.
In the address field of your web browser, enter the IP address of the switch.
If you do not know the IP address of the switch, see
The login window opens.
4.
Enter the switch’s password in the
Password
field.
The default password is
password
.
The System Information page displays.
5.
Select
Security > Port Authentication > Advanced > Port Authentication
.
The Port Authentication page displays.
6.
To view more columns, move the horizontal scroll bar below the table.
7.
Select the check box for the port.
You can also select multiple check boxes to apply the same settings to the selected ports,
or select the check box in the heading row to apply the same settings to all ports.
8.
Specify the following settings:
•
Port Control
. Defines the port authorization state. The control mode is set only if the
link status of the port is link up. Select one of the following options:
-
Auto
. The system automatically detects the mode of the port.
-
Authorized
. The system places the port into an authorized state without being
authenticated. The port sends and receives normal traffic without client
port-based authentication.
-
Unauthorized
. The system denies the selected port system access by moving
the interface into unauthorized state. The switch cannot provide authentication
services to the client through the port.
-
MAC based
. This mode allows multiple supplicants connected to the same port to
each authenticate individually. Each host connected to the port must authenticate
separately in order to gain access to the network. The hosts are distinguished by
their MAC addresses.