D-Link DGS-3200-16 User Manual - Page 149

Conditions and Limitations, WAC Global Settings

Page 149 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Conditions and Limitations 1. If the client is utilizing DHCP to attain an IP address, the authentication VLAN must provide a DHCP server or a DHCP relay function so that client may obtain an IP address. 2. Certain functions exist on the Switch that will filter HTTP packets, such as the Access Profile function. The user needs to be very careful when setting filter functions for the target VLAN, so that these HTTP packets are not denied by the Switch. 3. If a RADIUS server is to be used for authentication, the user must first establish a RADIUS Server with the appropriate parameters, including the target VLAN, before enabling Web Authentication on the Switch. WAC Global Settings Users can configure the Switch for Web authentication. To view the following window, click Security > Web Authentication > WAC Global Settings: Figure 5 - 46. WAC Global Settings window To set the Web Authentication for the Switch, complete the following fields: Parameter Description WAC State Use this drop-down menu to either enable or disable the Web Authentication on the Switch. Virtual IP Enter a virtual IP address. This address is only used by WAC and is not known by any other modules of the Switch. HTTP(s) Port (165535) Enter a HTTP port number. Port 80 is the default. Method Use this drop-down menu to choose the authenticator for Web-based Access Control. The user may choose: Local - Choose this parameter to use the local authentication method of the Switch as the authenticating method for users trying to access the network via the switch. This is, in fact, the username and password to access the Switch configured using the WAC User Settings window (Security > Web Authentication > WAC User Settings) seen below. RADIUS - Choose this parameter to use a remote RADIUS server as the authenticating method for users trying to access the network via the switch. This RADIUS server must have already been pre-assigned by the administrator using the Authentic RADIUS Server window (Security > 802.1X > Authentic RADIUS Server). Authenticating Failover Redirection Page Toggle between Enabled and Disabled. This is used to configure WAC authentication failover. By default, the authentication failover is disabled. If RADIUS servers are unreachable, the authentication will fail. When the authentication failover is enabled, if RADIUS server authentication is unreachable, the local database will be used to do the authentication. Enter the URL of the website that authenticated users placed in the VLAN are directed to once authenticated. This path must be entered into this field before the Web-based Access Control can be enabled. 136

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
136
Conditions and Limitations
1.
If the client is utilizing DHCP to attain an IP address, the authentication VLAN must provide a DHCP server or a DHCP
relay function so that client may obtain an IP address.
2.
Certain functions exist on the Switch that will filter HTTP packets, such as the Access Profile function. The user needs to
be very careful when setting filter functions for the target VLAN, so that these HTTP packets are not denied by the
Switch.
3.
If a RADIUS server is to be used for authentication, the user must first establish a RADIUS Server with the appropriate
parameters, including the target VLAN, before enabling Web Authentication on the Switch.
WAC Global Settings
Users can configure the Switch for Web authentication.
To view the following window, click
Security
>
Web Authentication
>
WAC Global Settings
:
Figure 5 - 46. WAC Global Settings window
To set the Web Authentication for the Switch, complete the following fields:
Parameter
Description
WAC State
Use this drop-down menu to either enable or disable the Web Authentication on the Switch.
Virtual IP
Enter a virtual IP address. This address is only used by WAC and is
not known by any other
modules of the Switch.
HTTP(s) Port (1-
65535)
Enter a HTTP port number. Port
80
is the default.
Method
Use this drop-down menu to choose the authenticator for Web-based Access Control. The
user may choose:
Local
– Choose this parameter to use the local authentication method of the Switch as the
authenticating method for users trying to access the network via the switch. This is, in fact,
the username and password to access the Switch configured using the
WAC User Settings
window (
Security
>
Web Authentication
>
WAC User Settings
) seen below.
RADIUS
– Choose this parameter to use a remote RADIUS server as the authenticating
method for users trying to access the network via the switch. This RADIUS server must have
already been pre-assigned by the administrator using the
Authentic RADIUS Server
window
(
Security
>
802.1X
>
Authentic RADIUS Server
).
Authenticating
Failover
Toggle between
Enabled
and
Disabled
. This is used to configure WAC authentication
failover. By default, the authentication failover is disabled. If RADIUS servers are
unreachable, the authentication will fail. When the authentication failover is enabled, if
RADIUS server authentication is unreachable, the local database will be used to do the
authentication.
Redirection Page
Enter the URL of the website that authenticated users placed in the VLAN are directed to
once authenticated. This path must be entered into this field before the Web-based Access
Control can be enabled.