DL manuals D-Link Switch xStack DES-3800 Series User Manual D-Link xStack DES-3800 Series User Manual - page 7 Other manuals for xStack DES-3800 Series: User Manual, Cli Manual, User Manual Manual is about: Layer 3 Stackable Fast Ethernet Managed Switch 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360 Page of 360 Go Download Print this page Bookmark us xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch Port-Based Network Access Control...........................................................................................................................................................208 MAC-Based Network Access Control ........................................................................................................................................................209 Configure 802.1x Authenticator Parameter.................................................................................................................................................210 Initializing Ports for Port Based 802.1x ......................................................................................................................................................212 Initializing Ports for MAC Based 802.1x....................................................................................................................................................213 Reauthenticate Port(s) for Port Based 802.1x .............................................................................................................................................214 Reauthenticate Port(s) for MAC-based 802.1x ...........................................................................................................................................214 Authentic RADIUS Server..........................................................................................................................................................................215 Guest VLANs..............................................................................................................................................................................................216 Guest VLAN Configuration ........................................................................................................................................................................216 Trusted Host............................................................................................................................................................................... 217 Access Authentication Control .................................................................................................................................................. 218 Authentication Policy and Parameter Settings ............................................................................................................................................219 Application Authentication Settings............................................................................................................................................................219 Authentication Server Group ......................................................................................................................................................................220 Authentication Server Host .........................................................................................................................................................................221 Login Method Lists.....................................................................................................................................................................................222 Enable Method Lists ...................................................................................................................................................................................224 Configure Local Enable Password ..............................................................................................................................................................226 Enable Admin .............................................................................................................................................................................................226 Accounting..................................................................................................................................................................................................227 Traffic Segmentation.................................................................................................................................................................. 228 Secure Socket Layer (SSL) ........................................................................................................................................................ 229 Download Certificate ..................................................................................................................................................................................229 Ciphersuite ..................................................................................................................................................................................................229 SSH ............................................................................................................................................................................................ 232 SSH Server Configuration...........................................................................................................................................................................232 SSH Authentication Mode and Algorithm Settings.....................................................................................................................................233 SSH User Authentication ............................................................................................................................................................................234 IP-MAC Binding........................................................................................................................................................................ 236 ACL Mode ..................................................................................................................................................................................................236 IP-MAC Binding Port .................................................................................................................................................................................238 IP-MAC Binding Table...............................................................................................................................................................................239 IP-MAC Binding Blocked...........................................................................................................................................................................240 Limited IP Multicast Range ....................................................................................................................................................... 241 Web-based Access Control ........................................................................................................................................................ 242 Conditions and Limitations .........................................................................................................................................................................242 MAC-Based Access Control...................................................................................................................................................... 247 Notes About MAC-Based Access Control ..................................................................................................................................................247 MAC-Based Access Control Global Settings..............................................................................................................................................247 MAC-Based Access Control Port Setting ...................................................................................................................................................249 MAC-Based Access Control Local Database Settings ................................................................................................................................250 Safeguard Engine ....................................................................................................................................................................... 251 Monitoring....................................................................................................................................................253 vii « ‹ Prev45678910Next › »