D-Link DGS-1210-10 Reference Guide - Page 64

Security > Smart Binding > Black List, AAA > 802.1X > 802.1X Settings

Page 64 highlights

5 Configuration D-Link Web Smart Switch User Manual Figure 5.76 - Security > Smart Binding > White List Select the check box of entry then click Delete to remove it. Click Select All to select all entries of the table or click Clean to select none entries. Please keep at least one management host in the White List. Security > Smart Binding > Black List The Black List page shows unauthorized accesses. When ARP Inspection is selected and a device sends out an ARP packet containing unmatched IP-MAC-Port information, the device will be forbidden and listed here. Figure 5.77 - Security > Smart Binding > Black List By giving conditions, desired devices information can be screened out below and then click Find to search for a list of the entry: VID: Enter the VLAN ID number of the device. IP Address: Enter the IP Address of the device. MAC Address: Enter the MAC Address of the device. Port: Enter the port number which the device connects to. Check a box of Delete column to release an entry from the forbidden list and then click Apply to delete an entry from the list. Click Select All to select all entries, or click Clean to select none of the entries AAA > 802.1X > 802.1X Settings Network switches provide easy and open access to resources, by simply attaching a client PC. Unfortunately this automatic configuration also allows unauthorized personnel to easily intrude and possibly gain access to sensitive data. IEEE-802.1X provides a security standard for network access control, especially in Wi-Fi wireless networks. 802.1X holds a network port disconnected until authentication is completed. The switch uses Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol client identity (such as a user name) with the client, and forward it to another remote RADIUS authentication server to verify access rights. The EAP packet from the RADIUS server also contains the authentication method to be used. The client can reject the authentication method and request another, depending on the configuration of the client software and the RADIUS server. Depending on the authenticated results, the port is either made available to the user, or the user is denied access to the network. The RADIUS servers make the network a lot easier to manage for the administrator by gathering and storing the user lists. 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

5
Configuration
D-Link Web Smart Switch User Manual
Figure 5.76 – Security > Smart Binding > White List
Select the check box of entry then click
Delete
to remove it.
Click
Select All
to select all entries of the table or click
Clean
to select none entries. Please keep at least
one management host in the White List.
Security > Smart Binding > Black List
The Black List page shows unauthorized accesses. When ARP Inspection is selected and a device sends
out an ARP packet containing unmatched IP-MAC-Port information, the device will be forbidden and listed
here.
Figure 5.77 – Security > Smart Binding > Black List
By giving conditions, desired devices information can be screened out below and then click
Find
to search
for a list of the entry:
VID:
Enter the VLAN ID number of the device.
IP Address:
Enter the IP Address of the device.
MAC Address:
Enter the MAC Address of the device.
Port:
Enter the port number which the device connects to.
Check a box of Delete column to release an entry from the forbidden list and then click
Apply
to delete an
entry from the list.
Click
Select All
to
select all entries, or click
Clean
to select none of the entries
AAA > 802.1X > 802.1X Settings
Network switches provide easy and open access to resources, by simply attaching a client PC. Unfortunately
this automatic configuration also allows unauthorized personnel to easily intrude and possibly gain access to
sensitive data.
IEEE-802.1X provides a security standard for network access control, especially in Wi-Fi wireless networks.
802.1X holds a network port disconnected until authentication is completed. The switch uses Extensible
Authentication Protocol over LANs (EAPOL) to exchange authentication protocol client identity (such as a
user name) with the client, and forward it to another remote RADIUS authentication server to verify access
rights. The EAP packet from the RADIUS server also contains the authentication method to be used. The
client can reject the authentication method and request another, depending on the configuration of the client
software and the RADIUS server. Depending on the authenticated results, the port is either made available
to the user, or the user is denied access to the network.
The RADIUS servers make the network a lot easier to manage for the administrator by gathering and storing
the user lists.
59