EasyManua.ls Logo

D-Link DES-3528 - Page 8

D-Link DES-3528
318 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xStack DES-3528 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
IMP Entry Settings......................................................................................................................................................................................131
DHCP Snooping Entries .............................................................................................................................................................................132
MAC Block List..........................................................................................................................................................................................132
Port Security............................................................................................................................................................................... 132
Port Security Settings..................................................................................................................................................................................132
Port Security FDB Entries...........................................................................................................................................................................133
DHCP Server Screening Settings............................................................................................................................................... 134
DHCP Screening Port Settings....................................................................................................................................................................134
DHCP Offer Filtering..................................................................................................................................................................................135
802.1X........................................................................................................................................................................................ 136
802.1x Port-Based and MAC-Based Access Control ..................................................................................................................................136
Understanding 802.1x Port-based and MAC-based Network Access Control ............................................................................................139
Port-Based Network Access Control...........................................................................................................................................................139
MAC-Based Network Access Control ........................................................................................................................................................140
802.1X Force Disconnect............................................................................................................................................................................141
802.1X Settings...........................................................................................................................................................................................141
802.1X User ................................................................................................................................................................................................143
Authentication RADIUS Server..................................................................................................................................................................143
Initialize Port(s)...........................................................................................................................................................................................144
Reauthenticate Port(s) .................................................................................................................................................................................144
Guest VLAN .............................................................................................................................................................................. 145
Guest VLAN Configuration........................................................................................................................................................................146
SSL Settings............................................................................................................................................................................... 146
Download Certificate ..................................................................................................................................................................................147
Ciphersuite ..................................................................................................................................................................................................147
SSH ............................................................................................................................................................................................ 149
SSH Settings ...............................................................................................................................................................................................149
SSH Authmode and Algorithm Settings......................................................................................................................................................150
SSH User Authentication Lists....................................................................................................................................................................151
Access Authentication Control .................................................................................................................................................. 153
Authentication Policy Settings....................................................................................................................................................................154
Application Authentication Settings............................................................................................................................................................154
Authentication Server Group ......................................................................................................................................................................155
Authentication Server..................................................................................................................................................................................156
Login Method Lists.....................................................................................................................................................................................157
Enable Method Lists ...................................................................................................................................................................................158
Local Enable Password Settings..................................................................................................................................................................159
RADIUS Accounting Services....................................................................................................................................................................160
MAC-Based Access Control...................................................................................................................................................... 161
Notes About MAC-Based Access Control ..................................................................................................................................................161
MAC Based Access Control Settings..........................................................................................................................................................161
MAC Based Access Control Local Settings................................................................................................................................................163
Web Authentication ................................................................................................................................................................... 164
Conditions and Limitations .........................................................................................................................................................................164
vii

Table of Contents

Related product manuals