D-Link DES-3528 Product Manual - Page 7

SSH Authentication Method and Algorithm Settings, MAC-based Access Control Authentication State - password

Page 7 highlights

xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide ND Snooping ...225 MAC-based Access Control (MAC)...227 MAC-based Access Control Settings ...227 MAC-based Access Control Local Settings...229 MAC-based Access Control Authentication State 230 Web-based Access Control (WAC)...231 WAC Global Settings...233 WAC User Settings...234 WAC Port Settings...235 WAC Authentication State ...236 Japanese Web-based Access Control (JWAC) ...236 JWAC Global Settings ...236 JWAC Port Settings...238 JWAC User Settings...240 JWAC Authentication State ...240 JWAC Customize Page Language ...241 JWAC Customize Page ...242 Compound Authentication...243 Compound Authentication Settings ...244 Compound Authentication Guest VLAN Settings ...246 Port Security...247 Port Security Settings ...247 Port Security VLAN Settings...248 Port Security Entries...249 ARP Spoofing Prevention Settings ...249 BPDU Attack Protection ...250 Loopback Detection Settings ...252 Traffic Segmentation Settings ...253 NetBIOS Filtering Settings ...254 DHCP Server Screening ...255 DHCP Server Screening Port Settings...255 DHCP Offer Permit Entry Settings...256 Access Authentication Control ...256 Enable Admin ...257 Authentication Policy Settings ...258 Application Authentication Settings ...259 Authentication Server Group Settings ...259 Authentication Server Settings ...261 Login Method Lists Settings ...262 Enable Method Lists Settings ...263 Local Enable Password Settings ...264 SSL Settings...265 SSH ...267 SSH Settings ...267 SSH Authentication Method and Algorithm Settings 268 SSH User Authentication List ...270 Trusted Host Settings...271 vi

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367

xStackĀ® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
vi
ND Snooping
...........................................................................................................................................................
225
MAC-based Access Control (MAC)
.............................................................................................................................
227
MAC-based Access Control Settings
......................................................................................................................
227
MAC-based Access Control Local Settings
.............................................................................................................
229
MAC-based Access Control Authentication State
...................................................................................................
230
Web-based Access Control (WAC)
.............................................................................................................................
231
WAC Global Settings
...............................................................................................................................................
233
WAC User Settings
..................................................................................................................................................
234
WAC Port Settings
...................................................................................................................................................
235
WAC Authentication State
.......................................................................................................................................
236
Japanese Web-based Access Control (JWAC)
..........................................................................................................
236
JWAC Global Settings
.............................................................................................................................................
236
JWAC Port Settings
.................................................................................................................................................
238
JWAC User Settings
................................................................................................................................................
240
JWAC Authentication State
.....................................................................................................................................
240
JWAC Customize Page Language
..........................................................................................................................
241
JWAC Customize Page
...........................................................................................................................................
242
Compound Authentication
...........................................................................................................................................
243
Compound Authentication Settings
.........................................................................................................................
244
Compound Authentication Guest VLAN Settings
....................................................................................................
246
Port Security
................................................................................................................................................................
247
Port Security Settings
..............................................................................................................................................
247
Port Security VLAN Settings
....................................................................................................................................
248
Port Security Entries
................................................................................................................................................
249
ARP Spoofing Prevention Settings
.............................................................................................................................
249
BPDU Attack Protection
..............................................................................................................................................
250
Loopback Detection Settings
......................................................................................................................................
252
Traffic Segmentation Settings
.....................................................................................................................................
253
NetBIOS Filtering Settings
..........................................................................................................................................
254
DHCP Server Screening
.............................................................................................................................................
255
DHCP Server Screening Port Settings
....................................................................................................................
255
DHCP Offer Permit Entry Settings
...........................................................................................................................
256
Access Authentication Control
....................................................................................................................................
256
Enable Admin
..........................................................................................................................................................
257
Authentication Policy Settings
.................................................................................................................................
258
Application Authentication Settings
.........................................................................................................................
259
Authentication Server Group Settings
.....................................................................................................................
259
Authentication Server Settings
................................................................................................................................
261
Login Method Lists Settings
....................................................................................................................................
262
Enable Method Lists Settings
..................................................................................................................................
263
Local Enable Password Settings
.............................................................................................................................
264
SSL Settings
................................................................................................................................................................
265
SSH
.............................................................................................................................................................................
267
SSH Settings
...........................................................................................................................................................
267
SSH Authentication Method and Algorithm Settings
...............................................................................................
268
SSH User Authentication List
..................................................................................................................................
270
Trusted Host Settings
..................................................................................................................................................
271