Select Language : English 日本語 中文(简体字)


Brazil: English / 日本語 / Português do Brasil
United States: English

Europe, Middle East, Africa (EMEA)

(Belgium, France, Germany, Netherlands, Spain, United Arab Emirates, United Kingdom)
English / 日本語 / Español / Deutsch / Français
Russia: English / 日本語 / русский

Asia Pacific

Japan(Business): English / 日本語
Japan(Residential): English / 日本語
Australia(NTT Com ICT Solutions): English
Mainland China: English / 日本語 / 簡體中文
Hong Kong & Macao: English / 日本語 / 繁体中文 / 簡體中文
India: English / 日本語
Indonesia: English
Korea: English / 日本語 / 한국어
Malaysia: English
Philippines(DTSI): English
Singapore: English / 日本語
Taiwan: English / 日本語 / 繁体中文
Thailand: English / 日本語
Vietnam: English / 日本語

Managed Security

Authentication VLAN Solution

Authentication VLAN provides authentication to devices attached to LAN ports, which protects an enterprise's intranet from unauthorized operation and threats.

Authentication VLAN is a high-level security solution to detect and block unauthorized users and computers from LAN. Moreover, it is possible to set network access authority based on the staff types, for example, full-time staff, temporary staff, and alliance partner. In this way, it significantly heightens the security of confidential information.


Features & Benefits

Authentication VLAN is to solve the following problems, and realize the access control user by user. It ensures the security at the gateway of network by the authentication from each port.

  • To Strengthen Security at the Gateway of Network
    Realizing security at network infrastructure level (layer 2 level), which will not be realized by applications. As those unauthorized users are blocked from the switch ports when authentication fails, it assures security, and at the same time, it eliminates those unnecessary network traffic.
  • Flexible Access Control
    Flexibly responding to layout change because the authentication is based on devices instead of physical ports. It is a secure and flexible user authentication on switch.
  • Perfect Security
    Possible to use IC card or finger print authentication device as a combination to enhance the security level.
  • 802.1x Authentication
    IEEE802.1x authentication (802.1x authentication) makes it possible to block those accesses from unauthenticated users. Switches supporting 802.1x authentication will only permit the traffic to network from those authorized users, and block those guest users or unauthorized users.

Back to Top

Shanghai industry and Commerce