D-Link DGS-3612G Product Manual - Page 406

MAC-based Access Control, MAC-based Access Control Global Settings

Page 406 highlights

xStack® DGS-3600 Series Layer 3 Managed Gigabit Ethernet Switch MAC-based Access Control The MAC-based Access Control feature will allow users to configure a list of MAC addresses, either locally or on a remote RADIUS server, to be authenticated by the Switch and given access rights based on the configurations set on the Switch of the target VLAN where these authenticated users are placed. For local authentication on the Switch, the user must enter a list of MAC addresses to be accepted through this mechanism using the MAC-based Access Control Global Settings window, as seen below. The user may enter up to 1024 MAC addresses locally on the Switch but only 1024 MAC addresses can be accepted per physical MAC-based Access Control enabled port. Once a MAC addresses has been authenticated by the Switch on the local side, the port where that MAC address resides will be placed in the previously configured target VLAN, where the rights and privileges are set by the switch administrator. If the VLAN Name for the target VLAN is not found by the Switch, the Switch will return the port containing that MAC address to the originating VLAN. If the MAC address is not found and the port is in the Guest VLAN, it will remain in the Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by the Switch. For remote RADIUS server authentication, the user must first configure the RADIUS server with a list of MAC addresses and relative target VLANs that are to be authenticated on the Switch. Once a MAC address has been discovered by the Switch, the Switch will then query the remote RADIUS server with this potential MAC address, using a RADIUS Access Request packet. If a match is made with this MAC address, the RADIUS server will return a notification stating that the MAC address has been accepted and is to be placed in the target VLAN. If the VID for the target VLAN is not found, the Switch will return the port containing the MAC address to the original VLAN. If the MAC address is not found, and if the port is in the Guest VLAN, it will remain in the Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by the Switch. Notes about MAC-based Access Control There are certain limitations and regulations regarding the MAC-based Access Control: Once this feature is enabled for a port, the Switch will clear the FDB of that port. MAC-based Access Control is its own entity and is not dependant on other authentication functions on the Switch, such as 802.1X, Web-Based authentication etc. A port accepts a maximum of 1024 authenticated MAC addresses in local mode and 4000 MAC addresses in radius mode per physical port of a VLAN that is not a Guest VLAN. Other MAC addresses attempting authentication on a port with the maximum number of authenticated MAC addresses will be blocked. Ports that have been enabled for Link Aggregation, stacking, 802.1X authentication, 802.1X Guest VLAN, Port Security, GVRP or Web-based authentication cannot be enabled for the MAC-based Authentication. MAC-based Access Control Guest VLAN cannot be a member of a Web-based authentication VLAN. MAC-based Access Control Global Settings The following window is used to set the parameters for the MAC-based Access Control function on the Switch. Here the user can set the running state, method of authentication, RADIUS password and view the Guest VLAN configuration to be associated with the MAC-based Access Control function of the Switch. To enable these Settings, click Security > MAC-based Access Control > MAC-based Access Control Global Settings, as shown below: 390

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546

xStack
®
DGS-3600 Series Layer 3 Managed Gigabit Ethernet Switch
MAC-based Access Control
The MAC-based Access Control feature will allow users to configure a list of MAC addresses, either locally or on a remote
RADIUS server, to be authenticated by the Switch and given access rights based on the configurations set on the Switch of the
target VLAN where these authenticated users are placed.
For local authentication on the Switch, the user must enter a list of MAC addresses to be accepted through this mechanism using
the MAC-based Access Control Global Settings window, as seen below. The user may enter up to 1024 MAC addresses locally on
the Switch but only 1024 MAC addresses can be accepted per physical MAC-based Access Control enabled port. Once a MAC
addresses has been authenticated by the Switch on the local side, the port where that MAC address resides will be placed in the
previously configured target VLAN, where the rights and privileges are set by the switch administrator. If the VLAN Name for
the target VLAN is not found by the Switch, the Switch will return the port containing that MAC address to the originating
VLAN. If the MAC address is not found and the port is in the Guest VLAN, it will remain in the Guest VLAN, with the
associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by the Switch.
For remote RADIUS server authentication, the user must first configure the RADIUS server with a list of MAC addresses and
relative target VLANs that are to be authenticated on the Switch. Once a MAC address has been discovered by the Switch, the
Switch will then query the remote RADIUS server with this potential MAC address, using a RADIUS Access Request packet. If a
match is made with this MAC address, the RADIUS server will return a notification stating that the MAC address has been
accepted and is to be placed in the target VLAN. If the VID for the target VLAN is not found, the Switch will return the port
containing the MAC address to the original VLAN. If the MAC address is not found, and if the port is in the Guest VLAN, it will
remain in the Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by
the Switch.
Notes about MAC-based Access Control
There are certain limitations and regulations regarding the MAC-based Access Control:
Once this feature is enabled for a port, the Switch will clear the FDB of that port.
MAC-based Access Control is its own entity and is not dependant on other authentication functions on the Switch, such as
802.1X, Web-Based authentication etc.
A port accepts a maximum of 1024 authenticated MAC addresses in local mode and 4000 MAC addresses in radius mode per
physical port of a VLAN that is not a Guest VLAN. Other MAC addresses attempting authentication on a port with the maximum
number of authenticated MAC addresses will be blocked.
Ports that have been enabled for Link Aggregation, stacking, 802.1X authentication, 802.1X Guest VLAN, Port Security, GVRP
or Web-based authentication cannot be enabled for the MAC-based Authentication.
MAC-based Access Control Guest VLAN cannot be a member of a Web-based authentication VLAN.
MAC-based Access Control Global Settings
The following window is used to set the parameters for the MAC-based Access Control function on the Switch. Here the user can
set the running state, method of authentication, RADIUS password and view the Guest VLAN configuration to be associated with
the MAC-based Access Control function of the Switch.
To enable these Settings, click
Security > MAC-based Access Control > MAC-based Access Control Global Settings
, as
shown below:
390