D-Link DGS-3200-16 User Manual - Page 127

X User, Capability, Direction, X User window - 24 firmware

Page 127 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch attempts by the client to authenticate. The Switch cannot provide authentication services to the client through the interface. If Auto is selected, it will enable 802.1X and cause the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port transitions from down to up, or when an EAPOLstart frame is received. The Switch then requests the identity of the client and begins relaying authentication messages between the client and the authentication server. The default setting is Auto. Capability This allows the 802.1X Authenticator settings to be applied on a per-port basis. Select Authenticator to apply the settings to the port. When the setting is activated, a user must pass the authentication process to gain access to the network. Select None disable 802.1X functions on the port. Direction Sets the administrative-controlled direction to Both. If Both is selected, control is exerted over both incoming and outgoing traffic through the controlled port selected in the first field. The In option is not supported in the present firmware release. Click Apply to implement your configuration changes. 802.1X User Users can set different local users on the Switch. To view the following window, click Security > 802.1X > 802.1X User: Figure 5 - 24. 802.1X User window Enter an 802.1X user name, Password, and confirmation of that password. Properly configured local users will be displayed in the 802.1X User Table at the bottom of the window. Click Apply to implement your configuration changes. 114

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
114
attempts by the client to authenticate. The Switch cannot provide authentication services to the
client through the interface.
If
Auto
is selected, it will enable 802.1X and cause the port to begin in the unauthorized state,
allowing only EAPOL frames to be sent and received through the port. The authentication
process begins when the link state of the port transitions from down to up, or when an EAPOL-
start frame is received. The Switch then requests the identity of the client and begins relaying
authentication messages between the client and the authentication server.
The default setting is
Auto
.
Capability
This allows the 802.1X Authenticator settings to be applied on a per-port basis. Select
Authenticator
to apply the settings to the port. When the setting is activated, a user must pass
the authentication process to gain access to the network. Select
None
disable 802.1X functions
on the port.
Direction
Sets the administrative-controlled direction to
Both
. If
Both
is selected, control is exerted over
both incoming and outgoing traffic through the controlled port selected in the first field. The
In
option is not supported in the present firmware release.
Click
Apply
to implement your configuration changes.
802.1X User
Users can set different local users on the Switch.
To view the following window, click
Security
>
802.1X
>
802.1X User
:
Figure 5 - 24. 802.1X User window
Enter an 802.1X user name, Password, and confirmation of that password. Properly configured local users will be displayed in the
802.1X User Table at the bottom of the window. Click
Apply
to implement your configuration changes.