D-Link xStack User Manual page 8

Layer 2+ gigabit ethernet managed switch
Hide thumbs Also See for xStack:
Table of Contents

Advertisement

Guest VLANs..............................................................................................................................................................................................235
Limitations Using the Guest VLAN ......................................................................................................................................................235
Configure 802.1X Guest VLAN .................................................................................................................................................................235
Configure 802.1X Authenticator.................................................................................................................................................................237
802.1X User ................................................................................................................................................................................................240
Initialize Port(s) ..........................................................................................................................................................................................240
Reauthenticate Port(s) .................................................................................................................................................................................242
Authentic RADIUS Server..........................................................................................................................................................................243
Web-based Access Control (WAC) ........................................................................................................................................... 245
Conditions and Limitations .........................................................................................................................................................................245
WAC Global State ......................................................................................................................................................................................245
WAC Port Settings......................................................................................................................................................................................247
WAC User Account ....................................................................................................................................................................................249
WAC Host Table Settings...........................................................................................................................................................................250
Trust Host................................................................................................................................................................................... 251
Access Authentication Control................................................................................................................................................... 252
Authentication Policy & Parameter Settings...............................................................................................................................................253
Application's Authentication Settings .........................................................................................................................................................253
Authentication Server Group ......................................................................................................................................................................254
Authentication Server Host .........................................................................................................................................................................255
Login Method Lists.....................................................................................................................................................................................257
Enable Method Lists ...................................................................................................................................................................................258
Configure Local Enable Password ..............................................................................................................................................................260
Enable Admin .............................................................................................................................................................................................261
RADIUS Accounting Settings ....................................................................................................................................................................262
MAC-based Access Control (MAC) .......................................................................................................................................... 264
Notes about MAC-based Access Control....................................................................................................................................................264
MAC-based Access Control Global Settings ..............................................................................................................................................264
MAC-based Access Control Local MAC Settings ......................................................................................................................................267
Safeguard Engine ....................................................................................................................................................................... 268
Safeguard Engine Settings ..........................................................................................................................................................................269
Traffic Segmentation.................................................................................................................................................................. 270
Secure Socket Layer (SSL) ........................................................................................................................................................ 271
SSL............................................................................................................................................................................................. 272
Secure Shell (SSH)..................................................................................................................................................................... 273
SSH Server Configuration...........................................................................................................................................................................274
SSH Authentication Mode and Algorithm Settings ....................................................................................................................................275
SSH User Authentication Mode..................................................................................................................................................................277
Compound Authentication ......................................................................................................................................................... 278
Compound Authentication Settings.............................................................................................................................................................278
Authentication Guest VLAN Settings.........................................................................................................................................................280
JWAC (Japanese Web-based Access Control)........................................................................................................................... 281
JWAC Global Configuration.......................................................................................................................................................................281
JWAC Port Settings ....................................................................................................................................................................................284
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dgs-3400 series

Table of Contents