D-Link DGS-1520 User Manual - Page 479
VID List Action, Multi Auth
View all D-Link DGS-1520 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 479 highlights
DGS-1520 Series Gigabit Ethernet Smart Managed Switch Web UI Reference Guide The fields that can be configured are described below: Parameter Unit From Port - To Port Host Mode VID List Action VID List CompAuth Mode Max Users Periodic ReAuth Timer Inactivity State Inactivity Timer Restart Description Select the Switch unit that will be used for this configuration here. Select the appropriate port range used for the configuration here. Select the host mode option that will be associated with the selected port(s) here. Options to choose from are Multi Host and Multi Auth. If the port is operated in the multi-host mode, and if one of the hosts is authenticated, then all other hosts are allowed to access the port. According to 802.1X authentication, if the reauthentication fails or the authenticated user logs off, the port will be blocked for a quiet period. The port restores the processing of EAPOL packets after the quiet period. If the port is operated in the multi-authenticated mode, then each host needs to be authenticated individually to access the port. A host is represented by its MAC address. Only the authorized host is allowed to access. Select the VID list action here. Options to choose from are None, Add, and Delete. After selecting the Multi Auth option as the Host Mode, the following parameter is available. Enter the VLAN ID used here. This is useful when different VLANs on the Switch have different authentication requirements. After the client is authenticated, the client will not be re-authenticated when received from other VLANs. This option is useful for trunk ports to do per-VLAN authentication control. When a port's authentication mode is changed to multi-host, the previous authentication VLAN(s) on this port will be cleared. Select the compound authentication mode option here. Options to choose from are: • Any - Specifies that if any of the authentication method (802.1X, MACbased Access Control or WAC) to passes, then pass. • MAC-WAC - Specifies to verify MAC-based authentication first. If the client passes, WAC will be verified next. Both authentication methods need to be passed. Enter the maximum users value used here. This value must be between 1 and 1024. Select to enable or disable periodic re-authentication for the selected port here. This parameter only affects the 802.1X protocol. Enter the re-authentication timer value here. This value must be between 1 and 65535 seconds. By default, this value is 3600 seconds. Select to enable or disable the inactivity state here. When the Inactivity State is enabled, enter the inactivity timer value here. This value must be between 120 and 65535 seconds. This parameter only affects the WAC authentication protocol. Enter the restart time value used here. This value must be between 1 and 65535 seconds. Click the Apply button to accept the changes made. 469