parameters. In addition, Guest VLANs are enabled from the Network Security Authentication Properties Page.

To define the network authentication properties:

1.Click System > Network Security > Authentication > Properties. The Network Security Authentication Properties Page opens:

Figure 43: Network Security Authentication Properties

Page

The Network Security Authentication Properties Page contains the following fields:

Port-Based Authentication State — Indicates if Port Authentication is enabled on the device. The possible field values are:

Enable — Enables port-based authentication on the device.

Disable — Disables port-based authentication on the device.

Authentication Method — Specifies the authentication method used for port authentication. The possible field values are:

None — Indicates that no authentication method is used to authenticate the port.

RADIUS — Provides port authentication using the RADIUS server.

RADIUS, None — Provides port authentication, first using the RADIUS server. If the port is not authenticated, then no authentication method is used, and the session is permitted.

Guest VLAN — Specifies whether the Guest VLAN is enabled on the device. The possible field values are:

Enable — Enables using a Guest VLAN for unauthorized ports. If a Guest VLAN is enabled, the unauthorized port automatically joins the VLAN selected in the VLAN List field.

Disable — Disables port-based authentication on the device. This is the default.

Guest VLAN ID — Contains a list of VLANs. The Guest VLAN is selected from the VLAN list.

2.Enable the Port-Based Authentication, and define the Authentication Method, enable Guest VLAN, and select the Guest

VLAN ID.

3.Click . The network security authentication properties are saved, and the device is updated.

5.2.2.1 Defining Port Authentication Properties

The Port Authentication Page allows network managers to configure port-based authentication global parameters.

To define the port-based authentication global properties:

1.Click System > Network Security > Authentication > Port Authentication. The Port Authentication Page opens:

Figure 44: Port Authentication Page

The Port Authentication Page contains the following fields:

Copy from Entry Number — Copies port authentica- tion information from the selected port.

to Entry Number(s) — Copies port authentication information to the selected port.

Port — Displays a list of interfaces on which port-based authentication is enabled.

User Name — Displays the supplicant user name.

3 3

Page 40
Image 40
TP-Link TL-SL3428 manual Defining Port Authentication Properties, Port Authentication Page contains the following fields

TL-SG3109, TL-SL3428, TL-SL3452 specifications

The TP-Link TL-SL3428 is a feature-rich Ethernet switch designed for small to medium-sized business environments. It is part of TP-Link’s JetStream series, which emphasizes reliability, performance, and robust management capabilities. Built with 28 10/100/1000 Mbps ports, the TL-SL3428 provides sufficient bandwidth to support a wide range of network applications.

One of the standout features of the TL-SL3428 is its support for Layer 2 management protocols. This allows for more granular control and optimized performance across network segments. The switch supports VLAN (Virtual Local Area Network) segmentation, which enhances network security and efficiency by isolating various types of traffic. This feature is particularly useful in larger organizations where different departments or teams may require separate network environments.

The TL-SL3428 also includes advanced QoS (Quality of Service) capabilities. This functionality prioritizes traffic based on predefined rules, which ensures that critical applications receive the necessary bandwidth to function optimally. With QoS implementation, users can experience minimized latency, leading to better performance in VoIP and video conferencing applications.

In terms of redundancy and reliability, the switch also supports Link Aggregation Control Protocol (LACP), enabling multiple connections to be combined for increased bandwidth and failover support. This feature significantly enhances network resilience, ensuring minimal downtime during failures.

Power over Ethernet (PoE) support is another important characteristic of the TL-SL3428. With PoE capabilities, this switch can deliver electrical power along with data over the same Ethernet cable, simplifying installation and reducing the need for additional wiring. This is especially advantageous for IP devices like cameras, access points, and VoIP phones.

Security features are abundant in the TL-SL3428 as well. It implements port security, storm control, and DHCP snooping, all of which contribute to a secure network infrastructure. The switch’s management capabilities can be accessed through a user-friendly web interface, making it easier for IT administrators to configure and monitor network activities.

Overall, the TP-Link TL-SL3428 is an exemplary choice for businesses looking to enhance their network performance with advanced management features, security protocols, and reliability. Its combination of speed, flexibility, and manageability make it a valuable tool for any growing organization.