Web-Based Access Control Settings; Conditions And Limitations - D-Link xStack DES-3528 series User Manual

Layer 2 managed stackable fast
Hide thumbs Also See for xStack DES-3528 series:
Table of Contents

Advertisement

®
xStack
DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual

Conditions and Limitations

1. If the client is utilizing DHCP to attain an IP address, the authentication VLAN must provide a DHCP server or
a DHCP relay function so that client may obtain an IP address.
2. Certain functions exist on the Switch that will filter HTTP packets, such as the Access Profile function. The
user needs to be very careful when setting filter functions for the target VLAN, so that these HTTP packets are
not denied by the Switch.
3. If a RADIUS server is to be used for authentication, the user must first establish a RADIUS Server with the
appropriate parameters, including the target VLAN, before enabling the Web-based Access Control on the
Switch.

Web-based Access Control Settings

To configure the Switch for Web Authentication Settings, open the Security > Web A uthentication > Web-based
Access Control Settings
To set the Web-based Access Control for the Switch, complete the following fields:
Parameter
State
Method
Authentication
Failover
Port Number
(1-65535)
Virtual IP
Figure 6 - 44 Web-based Access Control Settings
Description
Toggle the State field to either Enable or Disable for the Web-based Access Control settings
of the Switch.
Use the pull-down menu to choose the authenticator for Web-based Access Control. The user
may choose:
Local – Choose this parameter to use the local authentication method of the Switch as the
authenticating method for users trying to access the network via the switch. This is, in fact, the
username and password to access the Switch configured using the User Account Creation
screen seen below.
RADIUS – Choose this parameter to use a remote RADIUS server as the authenticating
method for users trying to access the network via the switch. This RADIUS server must have
already been pre-assigned by the administrator using the RADIUS Server window located in
the 802.1X section.
Specifies to Enable or Disable the Authen WAC Failover. When the Authentication Failover is
disabled, the authentication will fail if the RADIUS servers are unreachable. When the
Authentication Failover is enabled, the local database will be used to do the authentication if
the RADIUS server authentication is unreachable. By default, the state is Disabled.
This function specifies the TCP port that will be used to identify the HTTP or HTTPS packets
to be trapped to the CPU for the authentication process.
Select either HTTP or HTTPS and enter the ports.
HTTP – Specifies that the TCP port will run the WAC HTTP protocol. The default value is 80.
HTTP port cannot run at TCP port 443.
HTTPS – Specifies that the TCP port will run the WAC HTTPS protocol. The default value is
443. HTTPS cannot run at TCP port 80.
If no protocol is specified the protocol used is HTTP.
Enter a virtual IP address so that the TCP packets sent to the virtual IP will get a reply. If the
214

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack des-3552 series

Table of Contents