D-Link DES-3526DC Product Manual - Page 6

Limited IP Multicast Range Settings, MAC-Based Network Access Control

Page 6 highlights

Client...104 Authentication Process...104 Port-Based Network Access Control...105 MAC-Based Network Access Control ...106 Configure Authenticator...107 PAE System Control ...109 Port Capability ...109 Initializing Ports for Port Based 802.1x ...110 Initializing Ports for MAC Based 802.1x...111 Reauthenticate Port(s) for Port Based 802.1x ...111 RADIUS Server ...112 IP-MAC Binding...113 ACL Mode ...113 IP-MAC Binding Port ...115 IP-MAC Binding Table...116 IP-MAC Binding Blocked...117 Limited IP Multicast Range Settings ...118 Layer 3 IP Networking...119 Static ARP Table...119 DHCP/BOOTP Relay...120 DHCP / BOOTP Relay Global Settings ...120 The Implementation of DHCP Information Option 82 in the xStack DES-3500 Series switches 122 DHCP/BOOTP Relay Interface Settings...123 Management...124 Security IP ...124 User Accounts...124 Admin and User Privileges ...125 Access Authentication Control ...126 Policy & Parameters...127 Application's Authentication Settings ...127 Authentication Server Group Settings...128 Authentication Server Hosts...129 Login Method Lists ...131 Enable Method Lists ...132 Local Enable Password ...133 Enable Admin ...134 Secure Socket Layer (SSL) ...135 Download Certificate ...135 Configuration ...136 Secure Shell (SSH) ...137 SSH Configuration ...137 SSH Algorithm...138

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260

Client
...........................................................................................................................................................................................................
104
Authentication Process
...............................................................................................................................................................
104
Port-Based Network Access Control
..........................................................................................................................................
105
MAC-Based Network Access Control
.......................................................................................................................................
106
Configure Authenticator
.............................................................................................................................................................
107
PAE System Control
..................................................................................................................................................................
109
Port Capability
............................................................................................................................................................................................
109
Initializing Ports for Port Based 802.1x
......................................................................................................................................................
110
Initializing Ports for MAC Based 802.1x
....................................................................................................................................................
111
Reauthenticate Port(s) for Port Based 802.1x
.............................................................................................................................................
111
RADIUS Server
.........................................................................................................................................................................
112
IP-MAC Binding
..............................................................................................................................................................................
113
ACL Mode
.................................................................................................................................................................................
113
IP-MAC Binding Port
................................................................................................................................................................
115
IP-MAC Binding Table
..............................................................................................................................................................
116
IP-MAC Binding Blocked
..........................................................................................................................................................
117
Limited IP Multicast Range Settings
...............................................................................................................................................
118
Layer 3 IP Networking
.....................................................................................................................................................................
119
Static ARP Table
........................................................................................................................................................................
119
DHCP/BOOTP Relay
.................................................................................................................................................................
120
DHCP / BOOTP Relay Global Settings
......................................................................................................................................................
120
The Implementation of DHCP Information Option 82 in the xStack DES-3500 Series switches
...............................................................
122
DHCP/BOOTP Relay Interface Settings
.....................................................................................................................................................
123
Management
.....................................................................................................................................................................................
124
Security IP
.......................................................................................................................................................................................
124
User Accounts
..................................................................................................................................................................................
124
Admin and User Privileges
.........................................................................................................................................................................
125
Access Authentication Control
........................................................................................................................................................
126
Policy & Parameters
...................................................................................................................................................................
127
Application's Authentication Settings
........................................................................................................................................
127
Authentication Server Group Settings
........................................................................................................................................
128
Authentication Server Hosts
.......................................................................................................................................................
129
Login Method Lists
....................................................................................................................................................................
131
Enable Method Lists
..................................................................................................................................................................
132
Local Enable Password
..............................................................................................................................................................
133
Enable Admin
............................................................................................................................................................................
134
Secure Socket Layer (SSL)
..............................................................................................................................................................
135
Download Certificate
.................................................................................................................................................................
135
Configuration
.............................................................................................................................................................................
136
Secure Shell (SSH)
..........................................................................................................................................................................
137
SSH Configuration
.....................................................................................................................................................................
137
SSH Algorithm
...........................................................................................................................................................................
138