D-Link DGS-3120-24TC Product Manual - Page 224

MAC-based Access Control Authentication State, Web-based Access Control (WAC)

Page 224 highlights

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide Click the Find by MAC button to locate a specific entry based on the MAC address entered. Click the Find by VLAN button to locate a specific entry based on the VLAN name or ID entered. Click the View All button to display all the existing entries. To change the selected MAC address' VLAN Name, the user can click the Edit by Name button. Figure 8-27 MAC-based Access Control Local Settings - Edit by Name window To change the selected MAC address' VID value, the user can click the Edit by ID button. Figure 8-28 MAC-based Access Control Local Settings - Edit by ID window Enter a page number and click the Go button to navigate to a specific page when multiple pages exist. MAC-based Access Control Authentication State Users can display MAC-based access control Authentication State information. To view this window, click Security > MAC-based Access Control (MAC) > MAC-based Access Control Authentication State as shown below: Figure 8-29 MAC-based Access Control Authentication State window To display MAC-based access control Authentication State information, enter a port number in the space provided and then click the Find button. Click the Clear by Port button to clear all the information linked to the port number entered. Click the View All Hosts button to display all the existing hosts. Click the Clear All hosts button to clear out all the existing hosts. Web-based Access Control (WAC) Web-based Authentication Login is a feature designed to authenticate a user when the user is trying to access the Internet via the Switch. The authentication process uses the HTTP or HTTPS protocol. The Switch enters the authenticating stage when users attempt to browse Web pages (e.g., http://www.dlink.com) through a Web browser. When the Switch detects HTTP or HTTPS packets and this port is un-authenticated, the Switch will launch a popup user name and password window to query users. Users are not able to access the Internet until the authentication process is passed. 216

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide
216
Click the
Find by MAC
button to locate a specific entry based on the MAC address entered.
Click the
Find by VLAN
button to locate a specific entry based on the VLAN name or ID entered.
Click the
View All
button to display all the existing entries.
To change the selected MAC address’ VLAN Name, the user can click the
Edit by Name
button.
Figure 8–27 MAC-based Access Control Local Settings – Edit by Name window
To change the selected MAC address’ VID value, the user can click the
Edit by ID
button.
Figure 8–28 MAC-based Access Control Local Settings – Edit by ID window
Enter a page number and click the
Go
button to navigate to a specific page when multiple pages exist.
MAC-based Access Control Authentication State
Users can display MAC-based access control Authentication State information.
To view this window, click
Security > MAC-based Access Control (MAC) > MAC-based Access Control
Authentication State
as shown below:
Figure 8–29 MAC-based Access Control Authentication State window
To display MAC-based access control Authentication State information, enter a port number in the space provided
and then click the
Find
button.
Click the
Clear by Port
button to clear all the information linked to the port number entered.
Click the
View All Hosts
button to display all the existing hosts.
Click the
Clear All hosts
button to clear out all the existing hosts.
Web-based Access Control (WAC)
Web-based Authentication Login is a feature designed to authenticate a user when the user is trying to access the
Internet via the Switch. The authentication process uses the HTTP or HTTPS protocol. The Switch enters the
authenticating stage when users attempt to browse Web pages (e.g., http://www.dlink.com) through a Web browser.
When the Switch detects HTTP or HTTPS packets and this port is un-authenticated, the Switch will launch a pop-
up user name and password window to query users. Users are not able to access the Internet until the
authentication process is passed.