D-Link xStack DGS-3200-10 User Manual page 6

Xstack dgs-3200 series layer 2 managed gigabit ethernet switch
Hide thumbs Also See for xStack DGS-3200-10:
Table of Contents

Advertisement

xStack
Port Lock Entries ........................................................................................................................................................................................132
DHCP Server Screening............................................................................................................................................................. 133
DHCP Screening Port Settings....................................................................................................................................................................133
DHCP Offer Filtering..................................................................................................................................................................................134
Guest VLAN .............................................................................................................................................................................. 135
802.1X (Port-based and Host-based Access Control) ................................................................................................................ 136
Authentication Server ............................................................................................................................................................................137
Authenticator .........................................................................................................................................................................................137
Client .....................................................................................................................................................................................................138
Authentication Process ..........................................................................................................................................................................138
Understanding 802.1X Port-based and Host-based Network Access Control........................................................................................139
802.1X Settings...........................................................................................................................................................................................141
802.1X User ................................................................................................................................................................................................142
Initialize Port(s) ..........................................................................................................................................................................................143
Reauthenticate Port(s) .................................................................................................................................................................................144
Authentic RADIUS Server..........................................................................................................................................................................145
SSL Settings............................................................................................................................................................................... 146
SSH ............................................................................................................................................................................................ 148
SSH Configuration......................................................................................................................................................................................149
SSH Authmode and Algorithm Settings .....................................................................................................................................................150
SSH User Authentication Mode..................................................................................................................................................................152
Access Authentication Control................................................................................................................................................... 153
Authentication Policy and Parameter Settings ............................................................................................................................................154
Application Authentication Settings ...........................................................................................................................................................154
Authentication Server Group ......................................................................................................................................................................155
Authentication Server Host .........................................................................................................................................................................157
Login Method Lists.....................................................................................................................................................................................158
Enable Method Lists ...................................................................................................................................................................................159
Configure Local Enable Password ..............................................................................................................................................................160
Enable Admin .............................................................................................................................................................................................160
MAC-based Access Control (MAC) .......................................................................................................................................... 161
MAC Settings .............................................................................................................................................................................................161
MAC Local Settings....................................................................................................................................................................................164
Web-based Access Control (WAC) ........................................................................................................................................... 164
WAC Global Settings..................................................................................................................................................................................166
WAC User Settings.....................................................................................................................................................................................167
WAC Port Settings......................................................................................................................................................................................169
Japanese Web-based Access Control (JWAC)........................................................................................................................... 170
JWAC Global Settings ................................................................................................................................................................................170
JWAC Port Settings ....................................................................................................................................................................................172
JWAC User Settings ...................................................................................................................................................................................173
JWAC Customize Page Language ..............................................................................................................................................................173
JWAC Customize Page...............................................................................................................................................................................174
Multiple Authentication ............................................................................................................................................................. 174
Authorization Network State Settings.........................................................................................................................................................177
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
vi

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dgs-3200-16Xstack dgs-3200-24

Table of Contents