Releasing Advertisement; List Of Authenticable Hosts Under A Port - D-Link xStack DGS-3610 Series Configuration Manual

Hide thumbs Also See for xStack DGS-3610 Series:
Table of Contents

Advertisement

Chapter 37 Configuration of 802.1X
DGS-3610(config)# end
DGS-3610# show running-config
!
aaa new-model
!
aaa authorization ip-auth-mode radius-server
!
DGS-3610# write memory

37.2.15 Releasing Advertisement

Our 802.1X allows you to configure the Reply-Packet field on the Radius Server. When
authorization succeeds, the information of the field is shown on our 802.1X client of
Star-Supplicant, by which the operators can release some information.
Such information is shown during the first authorization of the user, but not during
re-authentication. This avoids frequently disturbing the user.
The window for showing the advertisement information supports html, which converts the
http://XXX.XXX.XX in the packet into links capable of direct switching, for easier browsing.
Releasing of the advertising information:
1.
The operator configures the Reply Packet attribute on the Radius Server end.
2.
Only our Star-supplicant client supports such information (free for the users of our
switch), while other clients cannot see the information, which however does not affect
their normal use.
3.
No setting is required at the device end.
37.2.16 List of Authenticable Hosts under a
Port
To enhance the security of the 802.1X, we have made expansion without affecting the IEEE
802.1X, allowing the NM to restrict the list of hosts authenticated of a port. If the list of hosts
authenticated of a port is empty, any user can be authenticated. If the list is not empty, only
the hosts in the list can be authenticated. The hosts that can be authenticated are identified
by using the MAC addresses.
The following example adds/deletes the hosts that can be authenticated under a port.
Command
configure terminal
dot1x auth-address-table address
mac-addr interface interface
end
write
37-24
DGS-3610 Series Configuration Guide
Function
Enter the global configuration mode.
Set the list of the hosts that can be authenticated.
Return to the privileged mode.
Save the configuration.

Advertisement

Table of Contents
loading

Table of Contents