D-Link xStack DGS-3610 Series Configuration Manual page 22

Hide thumbs Also See for xStack DGS-3610 Series:
Table of Contents

Advertisement

37.2.2
37.2.3
37.2.4
37.2.5
37.2.6
37.2.7
37.2.8
37.2.9
37.2.10
37.2.11
37.2.12
37.2.13
37.2.14
37.2.15
37.2.16
37.2.17
37.2.18
37.2.19
37.2.20
37.2.21
37.2.22
37.2.23
37.2.24
37.2.25
37.2.26
37.2.27
37.3 Viewing the Configuration and Current Statistics of the 802.1X ............................................37-32
37.3.1
37.3.2
37.3.3
37.3.4
37.3.5
37.3.6
37.4 Basic AAA Principles ................................................................................................................37-1
37.4.1
37.4.2
37.5 Basic AAA Configuration Steps ................................................................................................37-3
37.5.1
37.5.2
xviii
Precautions for Configuring 802.1X .............................................................37-9
Setting the 802.1X Authentication Switch .................................................. 37-11
Enabling/Disabling the Authentication of a Port .........................................37-12
Enabling Timing Re-authentication ............................................................37-13
Changing the QUIET Time .........................................................................37-14
Setting the Packet Retransmission Interval ...............................................37-15
Setting the Maximum Number of Requests ...............................................37-15
Setting the Maximum Number of Re-authentications ................................37-16
Setting the Server-timeout .........................................................................37-16
Configuring 802.1X Accounting..................................................................37-19
Configuring IP Authorization Modes...........................................................37-22
Releasing Advertisement ...........................................................................37-24
List of Authenticable Hosts under a Port ....................................................37-24
Authorization ..............................................................................................37-25
Configuring Authentication Modes .............................................................37-26
Configuring the Backup Authentication Server. .........................................37-27
Configuring and Managing Online Users ...................................................37-28
Implementing User-IP Binding ...................................................................37-28
Port-based Traffic Charging .......................................................................37-28
Implementing Automatic Jumping and Control of VLAN ............................37-28
Shielding Proxy Server and Dial-up ...........................................................37-29
Configuring On-line Client Probe ...............................................................37-30
Configuring the Port-Based User Authentication .......................................37-31
Viewing the Number of Current Users .......................................................37-33
Viewing the List of the Authenticable Addresses .......................................37-33
Viewing the User Authentication Status Information ..................................37-34
Showing the 1x Client Probe Timer Configuration .....................................37-34
Other Precautions for Configuring 802.1X .................................................37-35
Basic AAA Principles ....................................................................................37-2
Method List...................................................................................................37-2
Overview of AAA Configuration Steps ..........................................................37-3
Enabling AAA ...............................................................................................37-4

Advertisement

Table of Contents
loading

Table of Contents