D-Link DES-3526 User Manual page 5

Layer 2 managed stackable fast ethernet switch
Hide thumbs Also See for DES-3526:
Table of Contents

Advertisement

Traffic Segmentation.....................................................................................................................................................................................72
System Severity Alerts................................................................................................................................................................. 73
System Log Server ....................................................................................................................................................................... 73
SNTP Settings .............................................................................................................................................................................. 75
Time Setting..................................................................................................................................................................................................75
Time Zone and DST......................................................................................................................................................................................76
Access Profile Table .................................................................................................................................................................... 78
Configuring the Access Profile Table ...........................................................................................................................................................78
PAE Access Entity (802.1X)........................................................................................................................................................ 89
802.1x Port-Based and MAC-Based Access Control ....................................................................................................................................89
Authentication Process..................................................................................................................................................................................91
Port-Based Network Access Control.............................................................................................................................................................92
MAC-Based Network Access Control ..........................................................................................................................................................93
Configure Authenticator................................................................................................................................................................................94
PAE System Control .....................................................................................................................................................................................96
RADIUS Server ............................................................................................................................................................................................99
IP-MAC Binding........................................................................................................................................................................ 100
IP-MAC Binding Port .................................................................................................................................................................................100
IP-MAC Binding Table...............................................................................................................................................................................101
IP-MAC Binding Blocked...........................................................................................................................................................................102
Limited IP Multicast Range Settings ......................................................................................................................................... 103
Layer 3 IP Networking............................................................................................................................................................... 104
Static ARP Table.........................................................................................................................................................................................104
DHCP/BOOTP Relay .................................................................................................................................................................................105
Management..................................................................................................................................................................................... 109
Security IP.................................................................................................................................................................................. 109
User Accounts ............................................................................................................................................................................ 109
Access Authentication Control................................................................................................................................................... 111
Policy & Parameters....................................................................................................................................................................................111
Application's Authentication Settings .........................................................................................................................................................112
Authentication Server Group Settings.........................................................................................................................................................113
Authentication Server Hosts .......................................................................................................................................................................114
Login Method Lists.....................................................................................................................................................................................115
Enable Method Lists ...................................................................................................................................................................................117
Local Enable Password ...............................................................................................................................................................................118
Enable Admin .............................................................................................................................................................................................119
Secure Socket Layer (SSL) ........................................................................................................................................................ 120
Download Certificate ..................................................................................................................................................................................120
Ciphersuite ..................................................................................................................................................................................................121
Secure Shell (SSH)..................................................................................................................................................................... 122
SSH Configuration......................................................................................................................................................................................122
SSH Algorithm............................................................................................................................................................................................123
SSH User Authentication ............................................................................................................................................................................125

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack des-3526dcXstack des-3526

Table of Contents