|
|
| ||
| This window allows you to set the following features: |
| ||
|
|
|
|
|
| Parameter |
| Description |
|
|
|
|
|
|
| From Port / To Port |
| Enter the port or ports to be set. |
|
|
|
|
|
|
| QuietPeriod |
| This allows you to set the number of seconds that the Switch remains in the quiet state |
|
|
|
| following a failed authentication exchange with the client. The default setting is 60 seconds. |
|
|
|
|
|
|
| SuppTimeout |
| This value determines timeout conditions in the exchanges between the Authenticator and the |
|
|
|
| client. The default setting is 30 seconds. |
|
|
|
|
|
|
| ServerTimeout |
| This value determines timeout conditions in the exchanges between the Authenticator and the |
|
|
|
| authentication server. The default setting is 30 seconds. |
|
|
|
|
|
|
| MaxReq |
| The maximum number of times that the Switch will retransmit an EAP Request to the client |
|
|
|
| before it times out of the authentication sessions. The default setting is 2. |
|
|
|
|
|
|
| TxPeriod |
| This sets the TxPeriod of time for the authenticator PAE state machine. This value determines |
|
|
|
| the period of an EAP Request/Identity packet transmitted to the client. The default setting is |
|
|
|
| 30 seconds. |
|
|
|
|
|
|
| ReAuthPeriod |
| A constant that defines a nonzero number of seconds between periodic reauthentication of |
|
|
|
| the client. The default setting is 3600 seconds. |
|
|
|
|
|
|
| ReAuthentication |
| Determines whether regular reauthentication will take place on this port. The default setting is |
|
|
|
| Disabled. |
|
|
|
|
|
|
| PortControl |
| This allows you to control the port authorization state. |
|
|
|
| Select forceAuthorized to disable 802.1X and cause the port to transition to the authorized |
|
|
|
| state without any authentication exchange required. This means the port transmits and |
|
|
|
| receives normal traffic without |
|
|
|
| If forceUnauthorized is selected, the port will remain in the unauthorized state, ignoring all |
|
|
|
| attempts by the client to authenticate. The Switch cannot provide authentication services to |
|
|
|
| the client through the interface. |
|
|
|
| If Auto is selected, it will enable 802.1X and cause the port to begin in the unauthorized state, |
|
|
|
| allowing only EAPOL frames to be sent and received through the port. The authentication |
|
|
|
| process begins when the link state of the port transitions from down to up, or when an |
|
|
|
|
| |
|
|
| relaying authentication messages between the client and the authentication server. |
|
|
|
| The default setting is Auto. |
|
|
|
|
|
|
| Capability |
| This allows the 802.1X Authenticator settings to be applied on a |
|
|
|
| Authenticator to apply the settings to the port. When the setting is activated A user must pass |
|
|
|
| the authentication process to gain access to the network. Select None disable 802.1X |
|
|
|
| functions on the port. |
|
|
|
|
|
|
| Direction |
| Sets the |
|
|
|
| If in is selected, control is only exerted over incoming traffic through the port you selected in |
|
|
|
| the first field. |
|
|
|
| If both are selected, control is exerted over both incoming and outgoing traffic through the |
|
|
|
| controlled port selected in the first field. |
|
|
|
|
|
|
| Forward EAPOL |
| This enables or disables the Switch retransmit EAPOL PDU Request on a per port basis. |
|
| PDU On Port |
|
|
|
|
|
|
|
|
| Max User On Port |
| Specify the maximum number of users that can be learned via 802.1X authentication. |
|
|
|
|
|
|
|
|
|
| |
| Click Apply to implement your configuration changes. |
| ||
|
| 161 |
|