D-Link xStack DES-3800 Series User Manual page 7

Layer 3 stackable fast ethernet managed switch
Hide thumbs Also See for xStack DES-3800 Series:
Table of Contents

Advertisement

Port-Based Network Access Control...........................................................................................................................................................208
MAC-Based Network Access Control ........................................................................................................................................................209
Configure 802.1x Authenticator Parameter.................................................................................................................................................210
Initializing Ports for Port Based 802.1x ......................................................................................................................................................212
Initializing Ports for MAC Based 802.1x....................................................................................................................................................213
Reauthenticate Port(s) for Port Based 802.1x .............................................................................................................................................214
Reauthenticate Port(s) for MAC-based 802.1x ...........................................................................................................................................214
Authentic RADIUS Server..........................................................................................................................................................................215
Guest VLANs..............................................................................................................................................................................................216
Guest VLAN Configuration ........................................................................................................................................................................216
Trusted Host............................................................................................................................................................................... 217
Access Authentication Control .................................................................................................................................................. 218
Authentication Policy and Parameter Settings ............................................................................................................................................219
Application Authentication Settings............................................................................................................................................................219
Authentication Server Group ......................................................................................................................................................................220
Authentication Server Host .........................................................................................................................................................................221
Login Method Lists .....................................................................................................................................................................................222
Enable Method Lists ...................................................................................................................................................................................224
Configure Local Enable Password ..............................................................................................................................................................226
Enable Admin .............................................................................................................................................................................................226
Accounting..................................................................................................................................................................................................227
Traffic Segmentation.................................................................................................................................................................. 228
Secure Socket Layer (SSL) ........................................................................................................................................................ 229
Download Certificate ..................................................................................................................................................................................229
Ciphersuite ..................................................................................................................................................................................................229
SSH ............................................................................................................................................................................................ 232
SSH Server Configuration...........................................................................................................................................................................232
SSH Authentication Mode and Algorithm Settings.....................................................................................................................................233
SSH User Authentication ............................................................................................................................................................................234
IP-MAC Binding........................................................................................................................................................................ 236
ACL Mode ..................................................................................................................................................................................................236
IP-MAC Binding Port .................................................................................................................................................................................238
IP-MAC Binding Table...............................................................................................................................................................................239
IP-MAC Binding Blocked...........................................................................................................................................................................240
Limited IP Multicast Range ....................................................................................................................................................... 241
Web-based Access Control ........................................................................................................................................................ 242
Conditions and Limitations .........................................................................................................................................................................242
MAC-Based Access Control ...................................................................................................................................................... 247
Notes About MAC-Based Access Control ..................................................................................................................................................247
MAC-Based Access Control Global Settings..............................................................................................................................................247
MAC-Based Access Control Port Setting ...................................................................................................................................................249
MAC-Based Access Control Local Database Settings ................................................................................................................................250
Safeguard Engine ....................................................................................................................................................................... 251
Monitoring ....................................................................................................................................................253
xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch
vii

Advertisement

Table of Contents
loading

Table of Contents