Samsung SL-M4580FX User Manual Ver.1.0 (English) - Page 307

DHCPv6 Identity Association Identifier

Page 307 highlights

Network settings (configuring TCP/IP) -Stateful Address: This is an IPv6 address which is acquired by a DHCPv6 server. -Manual Address: This is an IPv6 address which an administrator can configure manually. • DHCPv6 Configuration: Select the DHCPv6 configuration you want to us. -Use DHCP as directed by a router: DHCPv6 is enabled when a router advertises to use DHCPv6. -Always Enable DHCP: Regardless of router advertisement, use DHCPv6 to acquire an IPv6 address. -Never use DHCP: Disables DHCPv6. • DHCPv6 Unique Identifier: Clients use an DHCP Unique Identifier (DUID) to obtain an IP address from the DHCPv6 server. The server looks up the DUID in its database and delivers the appropriate configuration data (address, lease times, DNS servers, etc.) to the client. • DHCPv6 Identity Association Identifier: Each interface has an ID, called an Identity Association Identifier (IAID), that binds the interface to one or more IP addresses. Each allocation in the DHCPv6 server includes a DUID and an IAID pair. Tap Settings > Network Settings > Ethernet > 802.1x from the home screen or Apps. • 802.1x : Check to enable this feature. • 802.1x Authentication Method: Select the authentication algorithm to use. -EAP-MD5: Offers minimal security. The MD5 hash function is vulnerable to dictionary attacks, and does not support key generation. -PEAP: Recommended for users who only intend to use Microsoft desktop clients and servers. For other users, it is not recommended. -EAP-MS-CHAPv2: MS-CHAPv2 provides two-way authentication between peers by combining a peer Challenge message with the Response packet and an authenticator Response message on the Success packet. -TLS: This is used to provide secure communication over the Internet between a client and server. 4 802.1x You can enable 802.1x authentication, which is a port-based authentication. If this authentication is enabled, the machine is not allowed to access through the protected side of the network until the machine is authorized. Use this feature to protect your network. 3. Network Setup 308

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383

Network settings (configuring TCP/IP)
308
3.
Network Setup
-
Stateful Address:
This is an IPv6 address which is acquired by a DHCPv6
server.
-
Manual Address:
This is an IPv6 address which an administrator can
configure manually.
DHCPv6 Configuration:
Select the DHCPv6 configuration you want to us.
-
Use DHCP as directed by a router:
DHCPv6 is enabled when a router
advertises to use DHCPv6.
-
Always Enable DHCP:
Regardless of router advertisement, use DHCPv6 to
acquire an IPv6 address.
-
Never use DHCP:
Disables DHCPv6.
DHCPv6 Unique Identifier:
Clients use an DHCP Unique Identifier (DUID) to
obtain an IP address from the DHCPv6 server. The server looks up the DUID
in its database and delivers the appropriate configuration data (address,
lease times, DNS servers, etc.) to the client.
DHCPv6 Identity Association Identifier:
Each interface has an ID, called an
Identity Association Identifier (IAID), that binds the interface to one or more
IP addresses. Each allocation in the DHCPv6 server includes a DUID and an
IAID pair.
4
802.1x
You can enable 802.1x authentication, which is a port-based authentication. If
this authentication is enabled, the machine is not allowed to access through the
protected side of the network until the machine is authorized. Use this feature
to protect your network.
Tap
Settings
>
Network Settings
>
Ethernet
>
802.1x
from the home screen
or
Apps
.
802.1x :
Check to enable this feature.
802.1x Authentication Method:
Select the authentication algorithm to
use.
-
EAP-MD5:
Offers minimal security. The MD5 hash function is vulnerable to
dictionary attacks, and does not support key generation.
-
PEAP:
Recommended for users who only intend to use Microsoft desktop
clients and servers. For other users, it is not recommended.
-
EAP-MS-CHAPv2:
MS-CHAPv2 provides two-way authentication between
peers by combining a peer Challenge message with the Response
packet and an authenticator Response message on the Success packet.
-
TLS:
This is used to provide secure communication over the Internet
between a client and server.