D-Link DWS-1008 - AirPremier MobileLAN Switch Product Manual page 13

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008 - AirPremier MobileLAN Switch:
Table of Contents

Advertisement

Creating Public-Private Key Pairs ......................................................................................262
Generating Self-Signed Certificates ..................................................................................262
Installing a CA's Own Certificate .......................................................................................265
Displaying Certificate and Key Information ...............................................................................265
Key and Certificate Configuration Scenarios ............................................................................266
Creating Self-Signed Certificates ......................................................................................266
Installing CA-Signed Certificates from PKCS #12 Object Files .........................................268
File .....................................................................................................................................269
Configuring AAA for Network Users ...........................................................................................272
About AAA for Network Users ..................................................................................................272
Authentication ....................................................................................................................272
Authentication Types ......................................................................................................273
Authentication Algorithm ................................................................................................274
Last-Resort Processing .................................................................................................274
User Credential Requirements ......................................................................................275
Authorization ......................................................................................................................275
Accounting .........................................................................................................................277
Summary of AAA Features ................................................................................................277
AAA Tools for Network Users....................................................................................................278
"Globs" and Groups for Network User Classification .........................................................278
AAA Methods for IEEE 802.1X and Web Network Access ................................................278
AAA Rollover Process ...................................................................................................279
Local Override Exception ..............................................................................................279
Remote Authentication with Local Backup ....................................................................279
IEEE 802.1X Extensible Authentication Protocol Types .....................................................280
Ways a Switch Can Use EAP ............................................................................................281
Effects of Authentication Type on Encryption Method ........................................................281
Configuring 802.1X Authentication ...........................................................................................282
Configuring EAP Offload ....................................................................................................282
Using Pass-Through ..........................................................................................................283
Authenticating via a Local Database..................................................................................283
Binding User Authentication to Machine Authentication ....................................................283
Authentication Rule Requirements ................................................................................284
Bonded Auth Period .......................................................................................................285
Bonded Auth Configuration Example ............................................................................286
Displaying Bonded Auth Configuration Information .......................................................286
Configuring Authentication and Authorization by MAC Address ...............................................287
Adding and Clearing MAC Users and User Groups Locally ..............................................288
Adding MAC Users and Groups ....................................................................................288
Clearing MAC Users and Groups ..................................................................................288
Configuring MAC Authentication and Authorization ...........................................................289
Changing the MAC Authorization Password for RADIUS ..................................................290
Configuring Web Portal WebAAA .............................................................................................291
How Web Portal WebAAA Works .......................................................................................291
D-Link DWS-1008 User Manual
xii

Advertisement

Table of Contents
loading

Table of Contents