D-Link xStack DGS-3400 Series User Manual page 7

Xstack dgs-3400 series layer 2 gigabit ethernet managed switch
Hide thumbs Also See for xStack DGS-3400 Series:
Table of Contents

Advertisement

The Advantages of QoS ..............................................................................................................................................................................149
Understanding QoS................................................................................................................................................................................150
Bandwidth Control......................................................................................................................................................................................151
QoS Scheduling Mechanism .......................................................................................................................................................................152
QoS Output Scheduling ..............................................................................................................................................................................153
Configuring the Combination Queue .....................................................................................................................................................154
802.1p Default Priority ...............................................................................................................................................................................155
802.1p User Priority....................................................................................................................................................................................156
ACL (Access Control List) ..........................................................................................................................157
Time Range ................................................................................................................................................................................ 157
Configuring the Access Profile Table ........................................................................................................................................ 158
CPU Interface Filtering .............................................................................................................................................................. 169
CPU Interface Filtering State Settings ........................................................................................................................................................169
CPU Interface Filtering Table .....................................................................................................................................................................169
Security .........................................................................................................................................................180
Traffic Control ........................................................................................................................................................................... 180
Port Security............................................................................................................................................................................... 183
Port Security Entries ...................................................................................................................................................................................184
Guest VLANs..............................................................................................................................................................................................185
Limitations Using the Guest VLAN ......................................................................................................................................................185
Guest VLAN ...............................................................................................................................................................................................186
Configure 802.1X Authenticator.................................................................................................................................................................187
802.1X User ................................................................................................................................................................................................189
Initializing Ports for Port Based 802.1X .....................................................................................................................................................190
Initializing Ports for MAC Based 802.1X...................................................................................................................................................191
Reauthenticate Port(s) for Port Based 802.1X.............................................................................................................................................191
Reauthenticate Port(s) for MAC-based 802.1X ..........................................................................................................................................192
Authentic RADIUS Server..........................................................................................................................................................................193
Trust Host................................................................................................................................................................................... 194
Access Authentication Control................................................................................................................................................... 195
Authentication Policy & Parameters ...........................................................................................................................................................196
Application's Authentication Settings .........................................................................................................................................................196
Authentication Server Group ......................................................................................................................................................................197
Authentication Server Host .........................................................................................................................................................................198
Login Method Lists.....................................................................................................................................................................................200
Enable Method Lists ...................................................................................................................................................................................201
Configure Local Enable Password ..............................................................................................................................................................203
Enable Admin .............................................................................................................................................................................................203
Traffic Segmentation.................................................................................................................................................................. 204
Secure Socket Layer (SSL) ........................................................................................................................................................ 205
Download Certificate ..................................................................................................................................................................................205
SSL Configuration ......................................................................................................................................................................................206
Secure Shell (SSH)..................................................................................................................................................................... 208

Advertisement

Table of Contents
loading

Table of Contents