Port-Based Network Access Control...........................................................................................................................................................208
MAC-Based Network Access Control ........................................................................................................................................................209
Authentic RADIUS Server..........................................................................................................................................................................215
Guest VLANs..............................................................................................................................................................................................216
Guest VLAN Configuration ........................................................................................................................................................................216
Trusted Host............................................................................................................................................................................... 217
Access Authentication Control .................................................................................................................................................. 218
Application Authentication Settings............................................................................................................................................................219
Authentication Server Group ......................................................................................................................................................................220
Authentication Server Host .........................................................................................................................................................................221
Login Method Lists .....................................................................................................................................................................................222
Enable Method Lists ...................................................................................................................................................................................224
Configure Local Enable Password ..............................................................................................................................................................226
Enable Admin .............................................................................................................................................................................................226
Accounting..................................................................................................................................................................................................227
Traffic Segmentation.................................................................................................................................................................. 228
Secure Socket Layer (SSL) ........................................................................................................................................................ 229
Download Certificate ..................................................................................................................................................................................229
Ciphersuite ..................................................................................................................................................................................................229
SSH ............................................................................................................................................................................................ 232
SSH Server Configuration...........................................................................................................................................................................232
SSH User Authentication ............................................................................................................................................................................234
IP-MAC Binding........................................................................................................................................................................ 236
ACL Mode ..................................................................................................................................................................................................236
IP-MAC Binding Port .................................................................................................................................................................................238
IP-MAC Binding Table...............................................................................................................................................................................239
IP-MAC Binding Blocked...........................................................................................................................................................................240
Limited IP Multicast Range ....................................................................................................................................................... 241
Web-based Access Control ........................................................................................................................................................ 242
Conditions and Limitations .........................................................................................................................................................................242
MAC-Based Access Control ...................................................................................................................................................... 247
Notes About MAC-Based Access Control ..................................................................................................................................................247
MAC-Based Access Control Port Setting ...................................................................................................................................................249
Safeguard Engine ....................................................................................................................................................................... 251
Monitoring ....................................................................................................................................................253
xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch
vii