D-Link DES-3528 User Manual page 8

Xstack
Hide thumbs Also See for DES-3528:
Table of Contents

Advertisement

xStack DES-3528 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
IMP Entry Settings......................................................................................................................................................................................131
DHCP Snooping Entries .............................................................................................................................................................................132
MAC Block List..........................................................................................................................................................................................132
Port Security............................................................................................................................................................................... 132
Port Security Settings..................................................................................................................................................................................132
Port Security FDB Entries...........................................................................................................................................................................133
DHCP Server Screening Settings............................................................................................................................................... 134
DHCP Screening Port Settings....................................................................................................................................................................134
DHCP Offer Filtering..................................................................................................................................................................................135
802.1x Port-Based and MAC-Based Access Control ..................................................................................................................................136
Understanding 802.1x Port-based and MAC-based Network Access Control ............................................................................................139
Port-Based Network Access Control...........................................................................................................................................................139
MAC-Based Network Access Control ........................................................................................................................................................140
802.1X Force Disconnect............................................................................................................................................................................141
802.1X Settings...........................................................................................................................................................................................141
802.1X User ................................................................................................................................................................................................143
Authentication RADIUS Server..................................................................................................................................................................143
Initialize Port(s)...........................................................................................................................................................................................144
Reauthenticate Port(s) .................................................................................................................................................................................144
Guest VLAN .............................................................................................................................................................................. 145
Guest VLAN Configuration ........................................................................................................................................................................146
SSL Settings............................................................................................................................................................................... 146
Download Certificate ..................................................................................................................................................................................147
Ciphersuite ..................................................................................................................................................................................................147
SSH ............................................................................................................................................................................................ 149
SSH Settings ...............................................................................................................................................................................................149
SSH Authmode and Algorithm Settings......................................................................................................................................................150
SSH User Authentication Lists....................................................................................................................................................................151
Access Authentication Control .................................................................................................................................................. 153
Authentication Policy Settings ....................................................................................................................................................................154
Application Authentication Settings............................................................................................................................................................154
Authentication Server Group ......................................................................................................................................................................155
Authentication Server..................................................................................................................................................................................156
Login Method Lists .....................................................................................................................................................................................157
Enable Method Lists ...................................................................................................................................................................................158
Local Enable Password Settings..................................................................................................................................................................159
RADIUS Accounting Services....................................................................................................................................................................160
MAC-Based Access Control ...................................................................................................................................................... 161
Notes About MAC-Based Access Control ..................................................................................................................................................161
MAC Based Access Control Settings..........................................................................................................................................................161
MAC Based Access Control Local Settings................................................................................................................................................163
Web Authentication ................................................................................................................................................................... 164
Conditions and Limitations .........................................................................................................................................................................164
vii

Advertisement

Table of Contents
loading

Table of Contents