Current Port Control — Displays the current port authorization state. The possible field values are:

Auto — Enables port-based authentication on the device. The interface moves between an authorized or unauthorized state based on the authentication exchange between the device and the client.

Authorized — Indicates the interface is in an authorized state without being authenticated. The interface re-sends and receives normal traffic without client port-based authentication.

Unauthorized — Denies the selected interface system access by moving the interface into unauthorized state. The device cannot provide authentication services to the client through the interface.

Enable Periodic Reauthentication — Permits immediate port reauthentication. The possible field values are:

Enable — Enables immediate port reauthentication. This is the default value.

Disable — Disables port reauthentication.

Reauthentication Period — Displays the time span (in seconds) in which the selected port is reauthenticated. The field default is 3600 seconds.

Authenticator State — Displays the current authenticator state.

Quiet Period — Displays the number of seconds that the device remains in the quiet state following a failed authentication exchange. The possible field range is 0-65535. The field default is 60 seconds.

Resending EAP — Defines the amount of time (in seconds) that lapses before EAP requests are resent. The field default is 30 seconds.

Max EAP Requests — Displays the total amount of EAP requests sent. If a response is not received after the defined period, the authentication process is restarted. The field default is 2 retries.

Supplicant Timeout — Displays the amount of time (in seconds) that lapses before EAP requests are resent to the supplicant. The field default is 30 seconds.

Server Timeout — Displays the amount of time (in seconds) that lapses before the device re-sends a request to the authentication server. The field default is 30 seconds.

Termination Cause — Indicates the reason for which the port authentication was terminated.

2.Click . The Port Authentication Settings Page opens:

Figure 45: Port Authentication Settings Page

3.Define the fields.

4.Check "Reauthenticate Now" to immediately reauthenticate the selected port when submitting.

5.Click . The port authentication settings are saved, and the device is updated.

5.2.2.2 Configuring Multiple Hosts

The Multiple Hosts Page allows network managers to configure advanced port-based authentication settings for specific ports and VLANs. For more information on advanced port-based authentication, see Advanced Port- Based Authentication.

To define the network authentication global properties:

1.Click System > Network Security > Authentication > Multiple Hosts. The Multiple Hosts Page opens:

3 4

Page 41
Image 41
TP-Link TL-SG3109, TL-SL3452, TL-SL3428 Configuring Multiple Hosts, Click . The Port Authentication Settings Page opens

TL-SG3109, TL-SL3428, TL-SL3452 specifications

The TP-Link TL-SL3428 is a feature-rich Ethernet switch designed for small to medium-sized business environments. It is part of TP-Link’s JetStream series, which emphasizes reliability, performance, and robust management capabilities. Built with 28 10/100/1000 Mbps ports, the TL-SL3428 provides sufficient bandwidth to support a wide range of network applications.

One of the standout features of the TL-SL3428 is its support for Layer 2 management protocols. This allows for more granular control and optimized performance across network segments. The switch supports VLAN (Virtual Local Area Network) segmentation, which enhances network security and efficiency by isolating various types of traffic. This feature is particularly useful in larger organizations where different departments or teams may require separate network environments.

The TL-SL3428 also includes advanced QoS (Quality of Service) capabilities. This functionality prioritizes traffic based on predefined rules, which ensures that critical applications receive the necessary bandwidth to function optimally. With QoS implementation, users can experience minimized latency, leading to better performance in VoIP and video conferencing applications.

In terms of redundancy and reliability, the switch also supports Link Aggregation Control Protocol (LACP), enabling multiple connections to be combined for increased bandwidth and failover support. This feature significantly enhances network resilience, ensuring minimal downtime during failures.

Power over Ethernet (PoE) support is another important characteristic of the TL-SL3428. With PoE capabilities, this switch can deliver electrical power along with data over the same Ethernet cable, simplifying installation and reducing the need for additional wiring. This is especially advantageous for IP devices like cameras, access points, and VoIP phones.

Security features are abundant in the TL-SL3428 as well. It implements port security, storm control, and DHCP snooping, all of which contribute to a secure network infrastructure. The switch’s management capabilities can be accessed through a user-friendly web interface, making it easier for IT administrators to configure and monitor network activities.

Overall, the TP-Link TL-SL3428 is an exemplary choice for businesses looking to enhance their network performance with advanced management features, security protocols, and reliability. Its combination of speed, flexibility, and manageability make it a valuable tool for any growing organization.