D-Link xStack DGS-3426P User Manual page 7

Layer 2 gigabit ethernet managed switch
Hide thumbs Also See for xStack DGS-3426P:
Table of Contents

Advertisement

The Advantages of QoS ..............................................................................................................................................................................150
Understanding QoS................................................................................................................................................................................151
Bandwidth Control......................................................................................................................................................................................152
QoS Scheduling Mechanism .......................................................................................................................................................................153
QoS Output Scheduling ..............................................................................................................................................................................154
Configuring the Combination Queue .....................................................................................................................................................155
802.1p Default Priority ...............................................................................................................................................................................156
802.1p User Priority....................................................................................................................................................................................157
ACL (Access Control List) ..........................................................................................................................158
Time Range ................................................................................................................................................................................ 158
Access Profile Table .................................................................................................................................................................. 159
CPU Interface Filtering .............................................................................................................................................................. 170
CPU Interface Filtering State Settings ........................................................................................................................................................170
CPU Interface Filtering Table .....................................................................................................................................................................170
Security .........................................................................................................................................................181
Traffic Control ........................................................................................................................................................................... 181
Port Security............................................................................................................................................................................... 184
Port Security Entries ...................................................................................................................................................................................185
Guest VLANs..............................................................................................................................................................................................186
Limitations Using the Guest VLAN ......................................................................................................................................................186
Guest VLAN ...............................................................................................................................................................................................187
Configure 802.1X Authenticator.................................................................................................................................................................188
Configure 802.1x Guest VLAN ..................................................................................................................................................................190
Authentic RADIUS Server..........................................................................................................................................................................191
Trust Host................................................................................................................................................................................... 192
Access Authentication Control................................................................................................................................................... 193
Authentication Policy & Parameters ...........................................................................................................................................................194
Application's Authentication Settings .........................................................................................................................................................194
Authentication Server Group ......................................................................................................................................................................195
Authentication Server Host .........................................................................................................................................................................196
Login Method Lists.....................................................................................................................................................................................198
Enable Method Lists ...................................................................................................................................................................................199
Configure Local Enable Password ..............................................................................................................................................................201
Enable Admin .............................................................................................................................................................................................201
Traffic Segmentation.................................................................................................................................................................. 202
Secure Socket Layer (SSL) ........................................................................................................................................................ 203
Download Certificate ..................................................................................................................................................................................203
SSL Configuration ......................................................................................................................................................................................204
Secure Shell (SSH)..................................................................................................................................................................... 206
SSH Configuration......................................................................................................................................................................................206
SSH Authentication Mode ..........................................................................................................................................................................207
SSH User Authentication Mode..................................................................................................................................................................209
JWAC (Japanese Web-based Access Control)........................................................................................................................... 211

Advertisement

Table of Contents
loading

Table of Contents