D-Link DGS-1510-28P User Manual - Page 330

Web-based Access Control, MAC Authentication User Name and Password Settings, User Name, Default

Page 330 highlights

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide The fields that can be configured for MAC Authentication User Name and Password Settings are described below: Parameter User Name Password Description Enter the username used for MAC authentication here. This name can be up to 16 characters long. Tick the Default option to restore the username to the client's MAC address here. Enter the password used for MAC authentication here. Tick the Encrypt option save this password in the encrypted form. Tick the Default option to restore the password to the client's MAC address here. Click the Apply button to accept the changes made. The fields that can be configured for MAC Authentication Port Settings are described below: Parameter Unit From Port / To Port State Description Select the switch unit that will be used for this configuration here. Select the appropriate port range used for the configuration here. Select to enable or disable MAC authentication for the port(s) specified here. Click the Apply button to accept the changes made. Web-based Access Control Web-based Access Control (WAC) is a feature designed to authenticate a user when the user is trying to access the Internet via the Switch. The authentication process uses the HTTP or HTTPS protocol. The Switch enters the authenticating stage when users attempt to browse Web pages (e.g., http://www.dlink.com) through a Web browser. When the Switch detects HTTP or HTTPS packets and this port is unauthenticated, the Switch will launch a pop-up user name and password window to query users. Users are not able to access the Internet until the authentication process is passed. The Switch can be the authentication server itself and do the authentication based on a local database, or be a RADIUS client and perform the authentication process via the RADIUS protocol with a remote RADIUS server. The client user initiates the authentication process of WAC by attempting to gain Web access. D-Link's implementation of WAC uses a virtual IP that is exclusively used by the WAC function and is not known by any other modules of the Switch. In fact, to avoid affecting a Switch's other features, WAC will only use a virtual IP address to communicate with hosts. Thus, all authentication requests must be sent to a virtual IP address but not to the IP address of the Switch's physical interface. Virtual IP works like this, when a host PC communicates with the WAC Switch through a virtual IP, the virtual IP is transformed into the physical IPIF (IP interface) address of the Switch to make the communication possible. The host PC and other servers' IP configurations do not depend on the virtual IP of WAC. The virtual IP does not respond to any ICMP packets or ARP requests, which means it is not allowed to configure a virtual IP on the same subnet as the Switch's IPIF (IP interface) or the same subnet as the host PCs' subnet. As all packets to a virtual IP from authenticated and authenticating hosts will be trapped to the Switch's CPU, if the virtual IP is the same as other servers or PCs, the hosts on the WAC-enabled ports cannot communicate with the server or PC which really own the IP address. If the hosts need to access the server or PC, the virtual IP cannot be the same as the one of the server or PC. If a host PC uses a proxy to access the Web, to make the authentication work properly the user of the PC should add the virtual IP to the exception of the proxy configuration. Whether or not a virtual IP is specified, users can access the 322

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide
322
The fields that can be configured for
MAC Authentication User Name and Password Settings
are
described below:
Parameter
Description
User Name
Enter the username used for MAC authentication here. This name can
be up to 16 characters long. Tick the
Default
option to restore the
username to the client’s MAC address here.
Password
Enter the password used for MAC authentication here. Tick the
Encrypt
option save this password in the encrypted form. Tick the
Default
option to restore the password to the client’s MAC address
here.
Click the
Apply
button to accept the changes made.
The fields that can be configured for
MAC Authentication Port Settings
are described below:
Parameter
Description
Unit
Select the switch unit that will be used for this configuration here.
From Port / To Port
Select the appropriate port range used for the configuration here.
State
Select to enable or disable MAC authentication for the port(s) specified
here.
Click the
Apply
button to accept the changes made.
Web-based Access Control
Web-based Access Control (WAC) is a feature designed to authenticate a user when the user is trying to
access the Internet via the Switch. The authentication process uses the HTTP or HTTPS protocol. The
Switch enters the authenticating stage when users attempt to browse Web pages (e.g.,
http://www.dlink.com) through a Web browser. When the Switch detects HTTP or HTTPS packets and
this port is unauthenticated, the Switch will launch a pop-up user name and password window to query
users. Users are not able to access the Internet until the authentication process is passed.
The Switch can be the authentication server itself and do the authentication based on a local database, or
be a RADIUS client and perform the authentication process via the RADIUS protocol with a remote
RADIUS server. The client user initiates the authentication process of WAC by attempting to gain Web
access.
D-Link’s implementation of WAC uses a virtual IP that is exclusively used by the WAC function and is not
known by any other modules of the Switch. In fact, to avoid affecting a Switch’s other features, WAC will
only use a virtual IP address to communicate with hosts. Thus, all authentication requests must be sent to
a virtual IP address but not to the IP address of the Switch’s physical interface.
Virtual IP works like this, when a host PC communicates with the WAC Switch through a virtual IP, the
virtual IP is transformed into the physical IPIF (IP interface) address of the Switch to make the
communication possible. The host PC and other servers’ IP configurations do not depend on the virtual IP
of WAC. The virtual IP does not respond to any ICMP packets or ARP requests, which means it is not
allowed to configure a virtual IP on the same subnet as the Switch’s IPIF (IP interface) or the same
subnet as the host PCs’ subnet.
As all packets to a virtual IP from authenticated and authenticating hosts will be trapped to the Switch’s
CPU, if the virtual IP is the same as other servers or PCs, the hosts on the WAC-enabled ports cannot
communicate with the server or PC which really own the IP address. If the hosts need to access the
server or PC, the virtual IP cannot be the same as the one of the server or PC. If a host PC uses a proxy
to access the Web, to make the authentication work properly the user of the PC should add the virtual IP
to the exception of the proxy configuration. Whether or not a virtual IP is specified, users can access the