D-Link DES-3528 Product Manual - Page 255

Compound Authentication Guest VLAN Settings

Page 255 highlights

xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide whether an individual security module is active on a port depends on its system state. As system states of WAC and JWAC are mutually exclusive, only one of them will be active on a port at the same time. 802.1X+IMPB - 802.1X will be verified first, and then IMPB will be verified. Both authentication methods need to be passed. IMPB+JWAC - IMPB will be verified first, and then JWAC will be verified. Both authentication methods need to be passed. IMPB+WAC - IMPB will be verified first, and then WAC will be verified. Both authentication methods need to be passed. MAC+IMPB - MAC will be verified first, and then IMPB will be verified. Both authentication methods need to be passed. Authorized Mode Toggle between Host-based and Port-based. When Port-based is selected, if one of the attached hosts passes the authentication, all hosts on the same port will be granted access to the network. If the user fails the authorization, this port will keep trying the next authentication method. When Host-based is selected, users are authenticated individually. VID List (e.g.: 1, 6-9) Enter a list of VLAN ID. State Use the drop-down menu to assign or remove the specified VID list as authentication VLAN(s). Click the Apply button to accept the changes made for each individual section. Compound Authentication Guest VLAN Settings Users can assign ports to or remove ports from a guest VLAN. To view this window, click Security > Compound Authentication > Compound Authentication Guest VLAN Settings, as shown below: Figure 8-48 Compound Authentication Guest VLAN Settings window The fields that can be configured are described below: Parameter Description VLAN Name Click the button and assign a VLAN as a Guest VLAN. The VLAN must be an existing static VLAN. VID (1-4094) Click the button and assign a VLAN ID for a Guest VLAN. The VLAN must be an existing static VLAN before this VID can be configured. Port List (e.g.: 1:1, 1:6- The list of ports to be configured. Alternatively, tick the All Ports check box to set every 1:9) port at once. Action Use the drop-down menu to choose the desired operation: Create VLAN, Add Ports, or Delete Ports. Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry. Once properly configured, the Guest VLAN and associated ports will be listed in the lower part of the window. 246

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367

xStackĀ® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
whether an individual security module is active on a port depends on its system
state. As system states of WAC and JWAC are mutually exclusive, only one of
them will be active on a port at the same time.
802.1X+IMPB
- 802.1X will be verified first, and then IMPB will be verified. Both
authentication methods need to be passed.
IMPB+JWAC
- IMPB will be verified first, and then JWAC will be verified. Both
authentication methods need to be passed.
IMPB+WAC
- IMPB will be verified first, and then WAC will be verified. Both
authentication methods need to be passed.
MAC+IMPB
- MAC will be verified first, and then IMPB will be verified. Both
authentication methods need to be passed.
Authorized Mode
Toggle between
Host-based
and
Port-based
. When
Port-based
is selected, if
one of the attached hosts passes the authentication, all hosts on the same port
will be granted access to the network. If the user fails the authorization, this port
will keep trying the next authentication method. When
Host-based
is selected,
users are authenticated individually.
VID List (e.g.: 1, 6-9)
Enter a list of VLAN ID.
State
Use the drop-down menu to assign or remove the specified VID list as
authentication VLAN(s).
Click the
Apply
button to accept the changes made for each individual section.
Compound Authentication Guest VLAN Settings
Users can assign ports to or remove ports from a guest VLAN.
To view this window, click
Security > Compound Authentication > Compound Authentication Guest VLAN
Settings
, as shown below:
Figure 8-48 Compound Authentication Guest VLAN Settings window
The fields that can be configured are described below:
Parameter
Description
VLAN Name
Click the button and assign a VLAN as a Guest VLAN. The VLAN must be an existing
static VLAN.
VID (1-4094)
Click the button and assign a VLAN ID for a Guest VLAN. The VLAN must be an existing
static VLAN before this VID can be configured.
Port List (e.g.: 1:1, 1:6-
1:9)
The list of ports to be configured. Alternatively, tick the All Ports check box to set every
port at once.
Action
Use the drop-down menu to choose the desired operation:
Create VLAN
,
Add Ports
, or
Delete Ports
.
Click the
Apply
button to accept the changes made.
Click the
Delete
button to remove the specific entry.
Once properly configured, the Guest VLAN
and associated ports will be listed in the lower part of the window.
246