Security > Port Security > Port Security Fdb Entry; Security > 802.1X > 802.1X Settings - D-Link DSG-1100-10/ME Manual

Table of Contents

Advertisement

D-Link DGS-1100-10/ME User Manual
The Port Security page contains the following fields:
From Port/To Port: Select a range of ports to be configured.
Admin State: Select either enable or disable Port Security (locked MAC address table for the selected
ports).
Max. Learning Address (0-64): Enter the number of MAC addresses that will be in the MAC address-
forwarding table for the selected switch and group of ports.
Lock Address Mode: Select how the MAC address table locking will be implemented for the selected group
of ports. The options are:
Delete On Reset – The locked addresses will not age out until the Switch has been reset.
Delete On Timeout – The locked addresses will age out after the aging timer expires.
Permanent – The locked addresses will not age out after the aging timer expires.
Click Apply for the settings to take effect.
Security > Port Security > Port Security FDB Entry
The Port Security FDB Entry page allows the Switch's dynamic forwarding table to be viewed. When the
Switch learns an association between a MAC address, VLAN and a port number, it makes an entry into its
forwarding table. These entries are then used to forward packets through the Switch.
Figure 4.92 - Security > Port Security > Port Security FDB Entry
From Port / To Port: Select the port range to be configured.
Click Clear to remove any lock entries on the selected port range.
Security > 802.1X > 802.1X Settings
Network switches provide easy and open access to resources by simply attaching a client PC. Unfortunately
this automatic configuration also allows unauthorized personnel to easily intrude and possibly gain access to
sensitive data.
IEEE-802.1X provides a security standard for network access control, especially in Wi-Fi wireless networks.
802.1X holds a network port disconnected until authentication is completed. The switch uses Extensible
Authentication Protocol over LANs (EAPOL) to exchange authentication protocol client identity (such as a
user name) with the client and forward it to another remote RADIUS authentication server to verify access
rights. The EAP packet from the RADIUS server also contains the authentication method to be used. The
client can reject the authentication method and request another, depending on the configuration of the client
Figure 4.91 - Security > Port Security > Port Security Settings
5
5
7
7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dgs-1100-06/me

Table of Contents