xStack DES-3528 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
IMP Entry Settings......................................................................................................................................................................................131
DHCP Snooping Entries .............................................................................................................................................................................132
MAC Block List..........................................................................................................................................................................................132
Port Security............................................................................................................................................................................... 132
Port Security Settings..................................................................................................................................................................................132
Port Security FDB Entries...........................................................................................................................................................................133
DHCP Server Screening Settings............................................................................................................................................... 134
DHCP Screening Port Settings....................................................................................................................................................................134
DHCP Offer Filtering..................................................................................................................................................................................135
Port-Based Network Access Control...........................................................................................................................................................139
MAC-Based Network Access Control ........................................................................................................................................................140
802.1X Force Disconnect............................................................................................................................................................................141
802.1X Settings...........................................................................................................................................................................................141
802.1X User ................................................................................................................................................................................................143
Authentication RADIUS Server..................................................................................................................................................................143
Initialize Port(s)...........................................................................................................................................................................................144
Reauthenticate Port(s) .................................................................................................................................................................................144
Guest VLAN .............................................................................................................................................................................. 145
Guest VLAN Configuration ........................................................................................................................................................................146
SSL Settings............................................................................................................................................................................... 146
Download Certificate ..................................................................................................................................................................................147
Ciphersuite ..................................................................................................................................................................................................147
SSH ............................................................................................................................................................................................ 149
SSH Settings ...............................................................................................................................................................................................149
SSH Authmode and Algorithm Settings......................................................................................................................................................150
SSH User Authentication Lists....................................................................................................................................................................151
Access Authentication Control .................................................................................................................................................. 153
Authentication Policy Settings ....................................................................................................................................................................154
Application Authentication Settings............................................................................................................................................................154
Authentication Server Group ......................................................................................................................................................................155
Authentication Server..................................................................................................................................................................................156
Login Method Lists .....................................................................................................................................................................................157
Enable Method Lists ...................................................................................................................................................................................158
Local Enable Password Settings..................................................................................................................................................................159
RADIUS Accounting Services....................................................................................................................................................................160
MAC-Based Access Control ...................................................................................................................................................... 161
Notes About MAC-Based Access Control ..................................................................................................................................................161
MAC Based Access Control Settings..........................................................................................................................................................161
Web Authentication ................................................................................................................................................................... 164
Conditions and Limitations .........................................................................................................................................................................164
vii