®
xStack
DGS-3620 Series Layer 3 Managed Stackable Gigabit Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter
Log State
Trap State
Filter ICMPv6
RA_All_Node State
ICMPv6 RA_All_Node
Permit
Click the Apply button to accept the changes made.
Click the Delete button to remove the specific entry based on the information entered.
Access Authentication Control
The TACACS / XTACACS / TACACS+ / RADIUS commands allow users to secure access to the Switch using the
TACACS / XTACACS / TACACS+ / RADIUS protocols. When a user logs in to the Switch or tries to access the
administrator level privilege, he or she is prompted for a password. If TACACS / XTACACS / TACACS+ / RADIUS
authentication is enabled on the Switch, it will contact a TACACS / XTACACS / TACACS+ / RADIUS server to
verify the user. If the user is verified, he or she is granted access to the Switch.
Figure 9-64 Filter ICMPv6 window
Description
This option is used to enable or disable the filter ICMPv6 RA All-nodes log state.
When the filter ICMPv6 RA all-nodes log state is enabled, the log of the "Detected
untrusted ICMPv6 All-nodes RA" will be generated.
This option is used to enable or disable the filter ICMPv6 RA all-nodes trap state.
When the filter ICMPv6 RA all-nodes trap state is enabled, the trap of the "illegal
ICMPv6 all-nodes RA is detected" will be sent out. If the ICMPv6 RA all-nodes
server trap state is disabled, no trap will be sent out.
This option is used to configure the filter ICMPv6 state.
Ports: Tick this All Ports option to include all the port in this configuration.
State: Select to enable or disable this option's state.
This option is used to create a filter ICMPv6 RA All-nodes permit entry.
Source IP Address: Enter the source address of entry which will be created into
the Filter ICMPv6 RA All-nodes forward list here.
Ports: Enter the list of ports, used for this configuration, here. Tick this All Ports
option to include all the port in this configuration.
443