EasyManuals Logo

D-Link xStack DGS-3200-10 User Manual

D-Link xStack DGS-3200-10
302 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #6 background imageLoading...
Page #6 background image
xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
vi
Port Lock Entries ........................................................................................................................................................................................132
DHCP Server Screening............................................................................................................................................................. 133
DHCP Screening Port Settings....................................................................................................................................................................133
DHCP Offer Filtering..................................................................................................................................................................................134
Guest VLAN .............................................................................................................................................................................. 135
802.1X (Port-based and Host-based Access Control) ................................................................................................................ 136
Authentication Server ............................................................................................................................................................................137
Authenticator .........................................................................................................................................................................................137
Client .....................................................................................................................................................................................................138
Authentication Process ..........................................................................................................................................................................138
Understanding 802.1X Port-based and Host-based Network Access Control........................................................................................139
802.1X Settings...........................................................................................................................................................................................141
802.1X User ................................................................................................................................................................................................142
Initialize Port(s) ..........................................................................................................................................................................................143
Reauthenticate Port(s) .................................................................................................................................................................................144
Authentic RADIUS Server..........................................................................................................................................................................145
SSL Settings............................................................................................................................................................................... 146
SSH ............................................................................................................................................................................................ 148
SSH Configuration......................................................................................................................................................................................149
SSH Authmode and Algorithm Settings .....................................................................................................................................................150
SSH User Authentication Mode..................................................................................................................................................................152
Access Authentication Control................................................................................................................................................... 153
Authentication Policy and Parameter Settings ............................................................................................................................................154
Application Authentication Settings ...........................................................................................................................................................154
Authentication Server Group ......................................................................................................................................................................155
Authentication Server Host.........................................................................................................................................................................157
Login Method Lists.....................................................................................................................................................................................158
Enable Method Lists ...................................................................................................................................................................................159
Configure Local Enable Password ..............................................................................................................................................................160
Enable Admin .............................................................................................................................................................................................160
MAC-based Access Control (MAC) .......................................................................................................................................... 161
MAC Settings .............................................................................................................................................................................................161
MAC Local Settings....................................................................................................................................................................................164
Web-based Access Control (WAC) ........................................................................................................................................... 164
WAC Global Settings..................................................................................................................................................................................166
WAC User Settings.....................................................................................................................................................................................167
WAC Port Settings......................................................................................................................................................................................169
Japanese Web-based Access Control (JWAC)........................................................................................................................... 170
JWAC Global Settings................................................................................................................................................................................170
JWAC Port Settings ....................................................................................................................................................................................172
JWAC User Settings ...................................................................................................................................................................................173
JWAC Customize Page Language ..............................................................................................................................................................173
JWAC Customize Page...............................................................................................................................................................................174
Multiple Authentication ............................................................................................................................................................. 174
Authorization Network State Settings.........................................................................................................................................................177

Table of Contents

Other manuals for D-Link xStack DGS-3200-10

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DGS-3200-10 and is the answer not in the manual?

D-Link xStack DGS-3200-10 Specifications

General IconGeneral
BrandD-Link
ModelxStack DGS-3200-10
CategoryNetwork Router
LanguageEnglish

Related product manuals