Compound Authentication - D-Link DGS-3427 - xStack Switch - Stackable Product Manual

Layer 2 managed gigabit ethernet switch
Hide thumbs Also See for DGS-3427 - xStack Switch - Stackable:
Table of Contents

Advertisement

x Stack
Auth. Mode
Host Name
Host IP
Click Apply to implement the changes.

Compound Authentication

Modern networks employ many authentication methods. The Compound Authentication methods supported by this Switch include
802.1X, MAC-based Access Control (MAC), Web-based Access Control (WAC), Japan Web-based Access Control (JWAC), and
IP-MAC-Port Binding (IMPB). The Compound Authentication feature allows clients running different authentication methods to
connect to the network using the same switch port.
The Compound Authentication feature can be implemented using one of the following modes:
Any (MAC, 802.1X, WAC or JWAC) Mode
In the diagram on the right, the Switch port has been
configured to allow clients to authenticate using 802.1X,
MAC, WAC, or JWAC. When a client tries to connect to the
network, the Switch will try to authenticate the client using
one of these methods and If the client passes, it will be
granted access to the network.
®
DGS-3400 Series Layer 2 Gigabit Ethernet M anaged Sw itch
must be a previously configured user account on the Switch.
The administrator may choose one of the following to set the authorization for users attempting
to access the Switch.
Host Based – This parameter should be chosen if the administrator wishes to use a remote
SSH server for authentication purposes. Choosing this parameter requires the user to input the
following information to identify the SSH user.
• Host Name – Enter an alphanumeric string of no more than 32 characters to identify
the remote SSH user.
• Host IP – Enter the corresponding IP address of the SSH user.
Password – This parameter should be chosen if the administrator wishes to use an
administrator-defined password for authentication. Upon entry of this parameter, the Switch will
prompt the administrator for a password, and then to re-type the password for confirmation.
Public Key – This parameter should be chosen if the administrator wishes to use the public key
on a SSH server for authentication.
Enter an alphanumeric string of no more than 32 characters to identify the remote SSH user.
This parameter is only used in conjunction with the Host Based choice in the Auth. Mode field.
Enter the corresponding IP address of the SSH user. This parameter is only used in
conjunction with the Host Based choice in the Auth. Mode field.
Figure 6 - 73 Any Mode – WAC example
Figure 6 - 74 Any Mode – JWAC example
339

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents