70
4.9 Security
The switch has the 802.1x port-based security feature. Only authorized
hosts are allowed to access the switch port. Traffic is blocked for hosts
failed to authenticate themselves. The authentication service is provided by
a RADIUS server or the local database in the switch.
The switch also supports dynamic VLAN assignment through 802.1x
authentication process. The VLAN information for the users/ports should
be configured in the authentication server properly before enabling this
feature.

4.9.1 Port Access Control

Port Access Control is used to configure various 802.1x parameters.
802.1x uses either RADIUS server or local database to authenticate
port users.
The first part is the Bridge (Global) settings:
Reauthentication: Once enabled, the switch will try to authenticate
the port user again when the re-authentication time is up.
Reauthentication Time: If 'Reauthentication' is enabled, this is the
time period the switch uses to re-send authentication request to the
port user.(see above)
Authentication Method: RADIUS or Local database can be used to
authenticate the port user.
Quiet Period: If authentication failed either from RADIUS or local
database, the switch waits upon this time period before sending
another authentication request to the port user.
Retransmission Time: If the port user failed to respond to
authentication request from the switch, the switch waits upon this time
period before sending another authentication request to the port user.
Max Reauthentication Attempts: Retry count if the port user failed to
respond to authentication requests from the switch.
The second part is the port settings. Please click when you're
done with the modifications.
Port: Specify which port to configure.