D-Link DES-3528 Product Manual - Page 245

Japanese Web-based Access Control (JWAC), WAC Authentication State, JWAC Global Settings

Page 245 highlights

xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide box to indicate the Idle state of the authenticated host on the port will never be checked. The default value is infinite. Block Time (0-300) This parameter is the period of time a host will be blocked if it fails to pass authentication. Enter a value between 0 and 300 seconds. The default value is 60 seconds. Click the Apply button to accept the changes made. WAC Authentication State Users can view and delete the hosts for WAC authentication. To view this window, click Security > Web-based Access Control (WAC) > WAC Authentication State, as shown below: Figure 8-40 WAC Authentication State window The fields that can be configured are described below: Parameter Description Port List (e.g.: 1:1, Use the drop-down menus to select the desired range of ports and tick the appropriate 1:5-1:10) check box(s), Authenticated, Authenticating, and Blocked. Authenticated Tick this check box to clear all authenticated users for a port. Authenticating Tick this check box to clear all authenticating users for a port. Blocked Tick this check box to clear all blocked users for a port. Click the Find button to locate a specific entry based on the information entered. Click the Clear by Port button to remove entry based on the port list entered. Click the View All Hosts button to display all the existing entries. Click the Clear All Hosts button to remove all the entries listed. Japanese Web-based Access Control (JWAC) The JWAC folder contains three windows: JWAC Global Settings, JWAC Port Settings, and JWAC User Settings. JWAC Global Settings Use this window to enable and configure Japanese Web-based Access Control on the Switch. Please note that JWAC and Web Authentication are mutually exclusive functions. That is, they cannot be enabled at the same time. To use the JWAC feature, computer users need to pass through two stages of authentication. The first stage is to do the authentication with the quarantine server and the second stage is the authentication with the Switch. For the second stage, the authentication is similar to Web Authentication. The RADIUS server will share the server configuration defined by the 802.1X command set. 236

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367

xStackĀ® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
box to indicate the Idle state of the authenticated host on the port will never be checked.
The default value is
infinite
.
Block Time (0-300)
This parameter is the period of time a host will be blocked if it fails to pass authentication.
Enter a value between
0
and
300
seconds. The default value is
60
seconds.
Click the
Apply
button to accept the changes made.
WAC Authentication State
Users can view and delete the hosts for WAC authentication.
To view this window, click
Security > Web-based Access Control (WAC) > WAC Authentication State
, as shown
below:
Figure 8-40 WAC Authentication State window
The fields that can be configured are described below:
Parameter
Description
Port List (e.g.: 1:1,
1:5-1:10)
Use the drop-down menus to select the desired range of ports and tick the appropriate
check box(s), Authenticated, Authenticating, and Blocked.
Authenticated
Tick this check box to clear all authenticated users for a port.
Authenticating
Tick this check box to clear all authenticating users for a port.
Blocked
Tick this check box to clear all blocked users for a port.
Click the
Find
button to locate a specific entry based on the information entered.
Click the
Clear by Port
button to remove entry based on the port list entered.
Click the
View All Hosts
button to display all the existing entries.
Click the
Clear All Hosts
button to remove all the entries listed.
Japanese Web-based Access Control (JWAC)
The JWAC folder contains three windows: JWAC Global Settings, JWAC Port Settings, and JWAC User Settings.
JWAC Global Settings
Use this window to enable and configure Japanese Web-based Access Control on the Switch. Please note that JWAC
and Web Authentication are mutually exclusive functions. That is, they cannot be enabled at the same time. To use the
JWAC feature, computer users need to pass through two stages of authentication. The first stage is to do the
authentication with the quarantine server and the second stage is the authentication with the Switch. For the second
stage, the authentication is similar to Web Authentication. The RADIUS server will share the server configuration
defined by the 802.1X command set.
236