802.1X Client Software User Guide
Page 4
...The server system is usually an 802.1X-supported network device, such as the authenticator system, please read this TP-Link switch. The 802.1X client software should be installed on the TP-Link switch prevents unauthorized clients from accessing the network. 802.1x operates in the typical client/server model. Authenticator System: The...an entity that provides authentication service to the authenticator system. The supplicant system is usually a common user terminal computer. When using the TP-Link switch as this user guide to access the LAN and authenticates the supplicant system.
...The server system is usually an 802.1X-supported network device, such as the authenticator system, please read this TP-Link switch. The 802.1X client software should be installed on the TP-Link switch prevents unauthorized clients from accessing the network. 802.1x operates in the typical client/server model. Authenticator System: The...an entity that provides authentication service to the authenticator system. The supplicant system is usually a common user terminal computer. When using the TP-Link switch as this user guide to access the LAN and authenticates the supplicant system.
802.1X Client Software User Guide
Page 5
...should be less than 16 characters as Name and Password if your switch does not support advanced authentication. 2. Select Advanced Authentication and click Advanced Setting to run the TP-Link 802.1X Client Figure 1-2 TP-Link 802.1X Client Enter the Name and the Password for EAP-...MD5 or PAP authentication method specified in the same directory with this interface, please ensure that both the TP-Link switch and the authentication server supports the authentication methods in the following screen will appear. After completing installation, double click the icon ...
...should be less than 16 characters as Name and Password if your switch does not support advanced authentication. 2. Select Advanced Authentication and click Advanced Setting to run the TP-Link 802.1X Client Figure 1-2 TP-Link 802.1X Client Enter the Name and the Password for EAP-...MD5 or PAP authentication method specified in the same directory with this interface, please ensure that both the TP-Link switch and the authentication server supports the authentication methods in the following screen will appear. After completing installation, double click the icon ...
802.1X Client Software User Guide
Page 7
... load the following screen for configuring the connection properties. Handshake:When this option if the Client automatically obtains the IP address from the switch within a period. 4 After passing the authentication, the Client can access the network after getting the new IP address. Auto reconnect after ... again when it does not receive the handshake reply packets from DHCP server. Click the Properties button on Figure B-12 to the switch via multicast and send the 802.1X authentication packets via unicast. Obtain an IP address automatically: Select this option is selected, the...
... load the following screen for configuring the connection properties. Handshake:When this option if the Client automatically obtains the IP address from the switch within a period. 4 After passing the authentication, the Client can access the network after getting the new IP address. Auto reconnect after ... again when it does not receive the handshake reply packets from DHCP server. Click the Properties button on Figure B-12 to the switch via multicast and send the 802.1X authentication packets via unicast. Obtain an IP address automatically: Select this option is selected, the...
802.1X Client Software User Guide
Page 9
...supported DLL file is encrypted. 6 Q3: Is it safe to download WinPcap 4.0.2 or the higher version for TP-Link switches. Q2: Is this error dialog box pop up when starting up the TP-Link 802.1X Client Software? The password saved in the configuration files is missing. 3 FAQ Q1: Why does ...this TP-Link 802.1X Client Software compliable with the switches of the other manufacturers? A2: No. This TP-Link 802.1X Client Software is customized for...
...supported DLL file is encrypted. 6 Q3: Is it safe to download WinPcap 4.0.2 or the higher version for TP-Link switches. Q2: Is this error dialog box pop up when starting up the TP-Link 802.1X Client Software? The password saved in the configuration files is missing. 3 FAQ Q1: Why does ...this TP-Link 802.1X Client Software compliable with the switches of the other manufacturers? A2: No. This TP-Link 802.1X Client Software is customized for...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 20
... and some Conventions. The device mentioned in this guide may be unavailable in this Guide stands for JetStream Gigabit Smart Switch without any explanation. For local sales information, visit https://www.tp-link.com. Overview of this Guide Chapter 1: Using the CLI Provide information about the commands used for configuring EEE. Chapter 4: System...
... and some Conventions. The device mentioned in this guide may be unavailable in this Guide stands for JetStream Gigabit Smart Switch without any explanation. For local sales information, visit https://www.tp-link.com. Overview of this Guide Chapter 1: Using the CLI Provide information about the commands used for configuring EEE. Chapter 4: System...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 23
Chapter 43: DHCPv6 Filter Commands Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol). Chapter 45: DLDP Commands Provide information about the commands used for configuring the DHCPv6 Filter. Chapter 41: IPv6 Verify ... information about the commands used for configuring ND detection. Chapter 49: ND Detection Commands Provide information about the commands used for protecting the switch from the ARP cheating or ARP Attack. Chapter 50: System Log Commands Provide information about the commands used for DoS defend and detecting ...
Chapter 43: DHCPv6 Filter Commands Provide information about the commands used for configuring the DLDP (Device Link Detection Protocol). Chapter 45: DLDP Commands Provide information about the commands used for configuring the DHCPv6 Filter. Chapter 41: IPv6 Verify ... information about the commands used for configuring ND detection. Chapter 49: ND Detection Commands Provide information about the commands used for protecting the switch from the ARP cheating or ARP Attack. Chapter 50: System Log Commands Provide information about the commands used for DoS defend and detecting ...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 24
Figure 1-2 Type in the prompt cmd window and press Enter. Telnet the switch's IP address (factory setting is 192.168.0.1) in the telnet command 5 Figure 1-1 Run Window 2. Click Start and type in cmd in the Search programs and files window and press the Enter button. Chapter 1 Using the CLI 1.1 Accessing the CLI You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet or SSH connection through an Ethernet port. 1.1.1 Logon by Telnet To log on to the switch by a Telnet connection, please take the following steps: 1.
Figure 1-2 Type in the prompt cmd window and press Enter. Telnet the switch's IP address (factory setting is 192.168.0.1) in the telnet command 5 Figure 1-1 Run Window 2. Click Start and type in cmd in the Search programs and files window and press the Enter button. Chapter 1 Using the CLI 1.1 Accessing the CLI You can log on to the switch and access the CLI by logging on to the switch remotely by a Telnet or SSH connection through an Ethernet port. 1.1.1 Logon by Telnet To log on to the switch by a Telnet connection, please take the following steps: 1.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 25
...Telnet connection. 2. The first time you log in , change the password to better protect your network and devices. 6 Figure 1-3 Log in the Switch Note: The first time you log in , change the password to enable the SSH function through Putty Key Generator. Before SSH login, please follow... and password, which are admin) and press the Enter button to enter Privileged EXEC Mode. 3. Key Authentication Mode: It requires a public key for the switch and a private key for both of them are both admin by SSH, a Putty client software is shown as Figure 1-3. Note: 1. Figure 1-4 Enter...
...Telnet connection. 2. The first time you log in , change the password to better protect your network and devices. 6 Figure 1-3 Log in the Switch Note: The first time you log in , change the password to enable the SSH function through Putty Key Generator. Before SSH login, please follow... and password, which are admin) and press the Enter button to enter Privileged EXEC Mode. 3. Key Authentication Mode: It requires a public key for the switch and a private key for both of them are both admin by SSH, a Putty client software is shown as Figure 1-3. Note: 1. Figure 1-4 Enter...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 26
Open the software to log on to the interface of the switch into Host Name field; keep the default value 22 in the Port field; select SSH as the Connection type. Enter the IP address of PuTTY. Figure 1-6 SSH Connection Config 7 Figure 1-5 Enable SSH function • Password Authentication Mode 1.
Open the software to log on to the interface of the switch into Host Name field; keep the default value 22 in the Port field; select SSH as the Connection type. Enter the IP address of PuTTY. Figure 1-6 SSH Connection Config 7 Figure 1-5 Enable SSH function • Password Authentication Mode 1.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 27
Select the key type and key length, and generate SSH key. During the key generation, randomly moving the mouse quickly can continue to 3072 bits. 2. Figure 1-8 Generate SSH Key Note: 1. Click the Open button in the range of 512 to configure the switch. Figure 1-7 Log on the switch, and then enter enable to the switch. The key length is in the above figure to log on to enter Privileged EXEC Mode, so you can accelerate the key generation. 8 2. Enter the login user name and password to log on the Switch • Key Authentication Mode 1.
Select the key type and key length, and generate SSH key. During the key generation, randomly moving the mouse quickly can continue to 3072 bits. 2. Figure 1-8 Generate SSH Key Note: 1. Click the Open button in the range of 512 to configure the switch. Figure 1-7 Log on the switch, and then enter enable to the switch. The key length is in the above figure to log on to enter Privileged EXEC Mode, so you can accelerate the key generation. 8 2. Enter the login user name and password to log on the Switch • Key Authentication Mode 1.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 28
After the key is successfully generated, please save the public key and private key to the switch, as the following figure shows: Figure 1-10 Download the Public Key 9 2. Log on to the switch by Telnet and download the public key file from the TFTP server to a TFTP server. Figure 1-9 Save the Generated Key 3.
After the key is successfully generated, please save the public key and private key to the switch, as the following figure shows: Figure 1-10 Download the Public Key 9 2. Log on to the switch by Telnet and download the public key file from the TFTP server to a TFTP server. Figure 1-9 Save the Generated Key 3.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 30
After successful authentication, please enter the login user name. If you log on the Switch 1.2 CLI Command Modes The CLI is divided into different Command Modes: User EXEC Mode, Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode. 11 Figure 1-12 Download the Private Key 6. Click Browse to download the private key file to the switch without entering password, it indicates that the key has been successfully downloaded. Figure 1-13 Log on to SSH client software and click Open. 5.
After successful authentication, please enter the login user name. If you log on the Switch 1.2 CLI Command Modes The CLI is divided into different Command Modes: User EXEC Mode, Privileged EXEC Mode, Global Configuration Mode, Interface Configuration Mode and VLAN Configuration Mode. 11 Figure 1-12 Download the Private Key 6. Click Browse to download the private key file to the switch without entering password, it indicates that the key has been successfully downloaded. Figure 1-13 Log on to SSH client software and click Open. 5.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 31
The following diagram. Use the configure command to disconnect the switch. Switch> Switch# Switch(config)# Switch(config-if)# or Switch(config-if-range)# Use the exit command to enter this mode from Privileged EXEC mode. Use the enable command to User EXEC mode.... to access Global Configuration mode. Use the enable command to Global Configuration mode. A port number must be divided into Interface Ethernet, Interface link-aggregation and some other modes, which is connected with the switch. Enter the exit or the # command to return to enter this mode from User EXEC mode.
The following diagram. Use the configure command to disconnect the switch. Switch> Switch# Switch(config)# Switch(config-if)# or Switch(config-if-range)# Use the exit command to enter this mode from Privileged EXEC mode. Use the enable command to User EXEC mode.... to access Global Configuration mode. Use the enable command to Global Configuration mode. A port number must be divided into Interface Ethernet, Interface link-aggregation and some other modes, which is connected with the switch. Enter the exit or the # command to return to enter this mode from User EXEC mode.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 32
... exit command or the # command to return to the Layer 2 interface mode. VLAN Configuration Mode Use the vlan vlan-list command to Privileged EXEC mode. Switch(config-vlan)# Use the end command or press Ctrl+Z to return to enter this mode from Global Configuration mode. Use the interface loopback id command...
... exit command or the # command to return to the Layer 2 interface mode. VLAN Configuration Mode Use the vlan vlan-list command to Privileged EXEC mode. Switch(config-vlan)# Use the end command or press Ctrl+Z to return to enter this mode from Global Configuration mode. Use the interface loopback id command...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 33
...You can configure one or several Ethernet ports. Different privilege levels have access to the VLAN. 3. Each command mode has its own set of switch, for several ports, different ports corresponds to user name (password) and user name (secret). For details about how to configure usename and ...the vlan-port. • VLAN Configuration Mode: In this mode, global commands are global, that means they can configure 14 c). Interface link-aggregation: Configure parameters for multi-trunks. To configure some commands, you can be performed in each pair. Interface range...
...You can configure one or several Ethernet ports. Different privilege levels have access to the VLAN. 3. Each command mode has its own set of switch, for several ports, different ports corresponds to user name (password) and user name (secret). For details about how to configure usename and ...the vlan-port. • VLAN Configuration Mode: In this mode, global commands are global, that means they can configure 14 c). Interface link-aggregation: Configure parameters for multi-trunks. To configure some commands, you can be performed in each pair. Interface range...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 36
..., please use no service password-encryption 17 Syntax service password-encryption no service password-encryption command. Encryption prevents the password from User EXEC Mode: Switch>enable Enter password: Switch# 2.2 service password-encryption Description The service password-encryption command is written, using the symmetric encryption algorithm. Example If you have set the password...
..., please use no service password-encryption 17 Syntax service password-encryption no service password-encryption command. Encryption prevents the password from User EXEC Mode: Switch>enable Enter password: Switch# 2.2 service password-encryption Description The service password-encryption command is written, using the symmetric encryption algorithm. Example If you have set the password...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 37
... After the encrypted password is used to set or change the password for users to access Privileged EXEC Mode from another switch's configuration file. Specify the encryption type. 0 indicates that an unencrypted password will follow . This command uses the symmetric.... Syntax enable password { [ 0 ] password | 7 encrypted-password } no enable password command. Example Enable the global encryption function: Switch(config)# service password-encryption 2.3 enable password Description The enable password command is configured, you can contain only English letters (case-sensitive), digits...
... After the encrypted password is used to set or change the password for users to access Privileged EXEC Mode from another switch's configuration file. Specify the encryption type. 0 indicates that an unencrypted password will follow . This command uses the symmetric.... Syntax enable password { [ 0 ] password | 7 encrypted-password } no enable password command. Example Enable the global encryption function: Switch(config)# service password-encryption 2.3 enable password Description The enable password command is configured, you can contain only English letters (case-sensitive), digits...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 38
...password in the configuration file will follow . Example Set the super password as "admin" and unencrypted to access Privileged EXEC Mode from User EXEC Mode: Switch(config)#enable password 0 admin 2.4 enable secret Description The enable secret command is used to set a secret password, which is empty. This command uses the... with 31 characters at most, which you re-enter this mode. 19 encrypted-password -- To return to access Privileged EXEC Mode from another switch's configuration file. Syntax enable secret { [ 0 ] password | 5 encrypted-password } no enable secret command.
...password in the configuration file will follow . Example Set the super password as "admin" and unencrypted to access Privileged EXEC Mode from User EXEC Mode: Switch(config)#enable password 0 admin 2.4 enable secret Description The enable secret command is used to set a secret password, which is empty. This command uses the... with 31 characters at most, which you re-enter this mode. 19 encrypted-password -- To return to access Privileged EXEC Mode from another switch's configuration file. Syntax enable secret { [ 0 ] password | 5 encrypted-password } no enable secret command.
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 39
... Configuration Mode from User EXEC Mode. Example Set the secret password as "admin" and unencrypted to access Privileged EXEC Mode from Privileged EXEC Mode: Switch# configure Switch(config)# 20 Switch(config)#enable secret 0 admin 2.5 configure Description The configure command is used to these commands. The password will take effect. Command Mode Global Configuration...
... Configuration Mode from User EXEC Mode. Example Set the secret password as "admin" and unencrypted to access Privileged EXEC Mode from Privileged EXEC Mode: Switch# configure Switch(config)# 20 Switch(config)#enable secret 0 admin 2.5 configure Description The configure command is used to these commands. The password will take effect. Command Mode Global Configuration...
T1500-28PCTTL-SL2428PUN V3 CLI Reference Guide Guide
Page 40
... Any Configuration Mode Privilege Requirement None. Example Return to Global Configuration Mode from Interface Configuration Mode, and then return to Privileged EXEC Mode: Switch(config-if)# exit Switch(config)#exit Switch# 2.7 end Description The end command is used to return to Privileged EXEC Mode. Example Return to these commands. 2.6 exit Description The exit... Command Mode Privileged EXEC Mode and Any Configuration Mode Privilege Requirement Only Admin level users have access to Privileged EXEC Mode from Interface Configuration Mode: Switch(config-if)#end...
... Any Configuration Mode Privilege Requirement None. Example Return to Global Configuration Mode from Interface Configuration Mode, and then return to Privileged EXEC Mode: Switch(config-if)# exit Switch(config)#exit Switch# 2.7 end Description The end command is used to return to Privileged EXEC Mode. Example Return to these commands. 2.6 exit Description The exit... Command Mode Privileged EXEC Mode and Any Configuration Mode Privilege Requirement Only Admin level users have access to Privileged EXEC Mode from Interface Configuration Mode: Switch(config-if)#end...