Each of the tables contains the following fields:

Profile Name — Contains a list of user-defined authentication profile lists to which user-defined authentication profiles are added.

Methods — Defines the user authentication methods. The possible field values are:

None — Assigns no authentication method to the authentication profile.

Local — Authenticates the user at the device level. The device checks the user name and password for authentication.

RADIUS — Authenticates the user at the RADIUS server. For more information, see Defining RADIUS Server Settings.

Line — Authenticates the user using a line password.

Enable — Authenticates the user using an enable password.

Remove — Removes the selected authentication profile. The possible field values are:

Checked — Removes the selected authentication profile.

Unchecked — Maintains the authentication profiles.

2.Click . The Add Authentication Profile Page opens.

Figure 30: Add Authentication Profile Page

3.Define the Profile Method and enter the Profile Name fields.

4.Select the Authentication Method using the move arrow

.

5.Click . The authentication profile is defined, and the device is updated.

To modify an authentication profile:

1.Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profiles Page opens.

2.Click . The Authentication Profile Settings Page opens:

Figure 31: Authentication Profile Settings Page

3.Select the Authentication Method using the move arrow

.

4.Click . The authentication method is selected, and the device is updated.

5.1.1.4 Mapping Authentication Profiles

After authentication profiles are defined, they can be applied to management access methods. For example, console users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authentication Method List 2. Authentication methods are selected using arrows. The order in which the methods are selected is the order by which the authentication methods are used.

To map authentication methods:

1.Click System > Management Security > Authentication > Authentication Mapping. The Authentication Mapping Page opens:

2 5

Page 32
Image 32
TP-Link TL-SG3109, TL-SL3452, TL-SL3428 Mapping Authentication Profiles, Click . The Add Authentication Profile Page opens

TL-SG3109, TL-SL3428, TL-SL3452 specifications

The TP-Link TL-SL3428 is a feature-rich Ethernet switch designed for small to medium-sized business environments. It is part of TP-Link’s JetStream series, which emphasizes reliability, performance, and robust management capabilities. Built with 28 10/100/1000 Mbps ports, the TL-SL3428 provides sufficient bandwidth to support a wide range of network applications.

One of the standout features of the TL-SL3428 is its support for Layer 2 management protocols. This allows for more granular control and optimized performance across network segments. The switch supports VLAN (Virtual Local Area Network) segmentation, which enhances network security and efficiency by isolating various types of traffic. This feature is particularly useful in larger organizations where different departments or teams may require separate network environments.

The TL-SL3428 also includes advanced QoS (Quality of Service) capabilities. This functionality prioritizes traffic based on predefined rules, which ensures that critical applications receive the necessary bandwidth to function optimally. With QoS implementation, users can experience minimized latency, leading to better performance in VoIP and video conferencing applications.

In terms of redundancy and reliability, the switch also supports Link Aggregation Control Protocol (LACP), enabling multiple connections to be combined for increased bandwidth and failover support. This feature significantly enhances network resilience, ensuring minimal downtime during failures.

Power over Ethernet (PoE) support is another important characteristic of the TL-SL3428. With PoE capabilities, this switch can deliver electrical power along with data over the same Ethernet cable, simplifying installation and reducing the need for additional wiring. This is especially advantageous for IP devices like cameras, access points, and VoIP phones.

Security features are abundant in the TL-SL3428 as well. It implements port security, storm control, and DHCP snooping, all of which contribute to a secure network infrastructure. The switch’s management capabilities can be accessed through a user-friendly web interface, making it easier for IT administrators to configure and monitor network activities.

Overall, the TP-Link TL-SL3428 is an exemplary choice for businesses looking to enhance their network performance with advanced management features, security protocols, and reliability. Its combination of speed, flexibility, and manageability make it a valuable tool for any growing organization.