D-Link xStack Reference Manual page 7

Web ui reference guide layer 2 managed gigabit ethernet switch
Hide thumbs Also See for xStack:
Table of Contents

Advertisement

®
xStack
DGS-3200 Series Layer 2 Managed Gigabit Ethernet Switch Web UI Reference Guide
IMPB Entry Settings ................................................................................................................................................................................... 135
MAC Block List .......................................................................................................................................................................................... 136
DHCP Snooping .......................................................................................................................................................................................... 137
DHCP Snooping Maximum Entry Settings ........................................................................................................................................... 137
DHCP Snooping Entry........................................................................................................................................................................... 137
ND Snoop ................................................................................................................................................................................................... 138
ND Snoop Maximum Entry Settings ..................................................................................................................................................... 138
ND Snoop Entry .................................................................................................................................................................................... 139
Port Security ............................................................................................................................................................................... 139
Port Security Settings .................................................................................................................................................................................. 139
Port Lock Entries ........................................................................................................................................................................................ 140
DHCP Server Screening ............................................................................................................................................................. 141
DHCP Screening Port Settings .................................................................................................................................................................... 141
DHCP Offer Filtering .................................................................................................................................................................................. 142
802.1X (Port-based and Host-based Access Control) ................................................................................................................ 143
Authentication Server ............................................................................................................................................................................ 144
Authenticator ......................................................................................................................................................................................... 144
Client ..................................................................................................................................................................................................... 145
Authentication Process .......................................................................................................................................................................... 145
Understanding 802.1X Port-based and Host-based Network Access Control ........................................................................................ 146
802.1X Global Settings ............................................................................................................................................................................... 148
802.1X Port Settings ................................................................................................................................................................................... 149
802.1X User Settings .................................................................................................................................................................................. 151
Guest VLAN Settings ................................................................................................................................................................................. 151
Authenticator State ...................................................................................................................................................................................... 152
Authenticator Statistics ............................................................................................................................................................................... 152
Authenticator Session Statistics .................................................................................................................................................................. 153
Authenticator Diagnostics ........................................................................................................................................................................... 154
Initialize Port-based Port(s) ......................................................................................................................................................................... 155
Initialize Host-based Port(s) ........................................................................................................................................................................ 156
Reauthenticate Port-based Port(s) ............................................................................................................................................................... 156
Reauthenticate Host-based Port(s) .............................................................................................................................................................. 156
SSL ............................................................................................................................................................................................. 157
SSL Settings ................................................................................................................................................................................................ 157
SSL Certification Settings ........................................................................................................................................................................... 159
SSH ............................................................................................................................................................................................ 159
SSH Settings ............................................................................................................................................................................................... 160
SSH Authentication Method and Algorithm Settings ................................................................................................................................. 161
SSH User Authentication List ..................................................................................................................................................................... 162
Access Authentication Control ................................................................................................................................................... 163
Enable Admin ............................................................................................................................................................................................. 164
Authentication Policy Settings .................................................................................................................................................................... 164
Application Authentication Settings ........................................................................................................................................................... 165
Authentication Server Group ...................................................................................................................................................................... 165
Authentication Server Settings .................................................................................................................................................................... 167
vii

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dgs-3200 series

Table of Contents