EasyManua.ls Logo

D-Link xStack - Page 8

D-Link xStack
357 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
802.1X........................................................................................................................................................................................ 230
Guest VLANs..............................................................................................................................................................................................235
Limitations Using the Guest VLAN ......................................................................................................................................................235
Configure 802.1X Guest VLAN .................................................................................................................................................................235
Configure 802.1X Authenticator.................................................................................................................................................................237
802.1X User................................................................................................................................................................................................240
Initialize Port(s) ..........................................................................................................................................................................................240
Reauthenticate Port(s).................................................................................................................................................................................242
Authentic RADIUS Server..........................................................................................................................................................................243
Web-based Access Control (WAC) ........................................................................................................................................... 245
Conditions and Limitations.........................................................................................................................................................................245
WAC Global State ......................................................................................................................................................................................245
WAC Port Settings......................................................................................................................................................................................247
WAC User Account....................................................................................................................................................................................249
WAC Host Table Settings...........................................................................................................................................................................250
Trust Host................................................................................................................................................................................... 251
Access Authentication Control................................................................................................................................................... 252
Authentication Policy & Parameter Settings...............................................................................................................................................253
Application's Authentication Settings.........................................................................................................................................................253
Authentication Server Group ......................................................................................................................................................................254
Authentication Server Host.........................................................................................................................................................................255
Login Method Lists.....................................................................................................................................................................................257
Enable Method Lists...................................................................................................................................................................................258
Configure Local Enable Password..............................................................................................................................................................260
Enable Admin.............................................................................................................................................................................................261
RADIUS Accounting Settings ....................................................................................................................................................................262
MAC-based Access Control (MAC).......................................................................................................................................... 264
Notes about MAC-based Access Control....................................................................................................................................................264
MAC-based Access Control Global Settings ..............................................................................................................................................264
MAC-based Access Control Local MAC Settings......................................................................................................................................267
Safeguard Engine....................................................................................................................................................................... 268
Safeguard Engine Settings ..........................................................................................................................................................................269
Traffic Segmentation.................................................................................................................................................................. 270
Secure Socket Layer (SSL)........................................................................................................................................................ 271
SSL............................................................................................................................................................................................. 272
Secure Shell (SSH)..................................................................................................................................................................... 273
SSH Server Configuration...........................................................................................................................................................................274
SSH Authentication Mode and Algorithm Settings ....................................................................................................................................275
SSH User Authentication Mode..................................................................................................................................................................277
Compound Authentication......................................................................................................................................................... 278
Compound Authentication Settings.............................................................................................................................................................278
Authentication Guest VLAN Settings.........................................................................................................................................................280
JWAC (Japanese Web-based Access Control)........................................................................................................................... 281
JWAC Global Configuration.......................................................................................................................................................................281
JWAC Port Settings....................................................................................................................................................................................284

Table of Contents

Other manuals for D-Link xStack

Related product manuals