D-Link DGS-3120-24PC-EI Product Manual - Page 221

DHCP Snooping Entry, MAC-based Access Control (MAC)

Page 221 highlights

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide From Port / To Port Use the drop-down menus to select a range of ports to use. Maximum Entry Enter the maximum entry value. Click the Apply button to accept the changes made. DHCP Snooping Entry This window is used to view dynamic entries on specific ports. To view this window, click Security > IP-MAC-Port Binding (IMPB) > DHCP Snooping > DHCP Snooping Entry as shown below: Figure 8-24 DHCP Snooping Entry window The fields that can be configured are described below: Parameter Description Port Use the drop-down menu to select the desired port. Ports (e.g.: 1, 7-12) Specify the ports for which to view DHCP snooping entries. Tick the All check box to clear entries for all ports. Click the Find button to locate a specific entry based on the port number selected. Click the Clear button to clear all the information entered in the fields. Click the View All button to display all the existing entries. MAC-based Access Control (MAC) MAC-based access control is a method to authenticate and authorize access using either a port or host. For portbased MAC-based access control, the method decides port access rights, while for host-based MAC-based access control, the method determines the MAC access rights. A MAC user must be authenticated before being granted access to a network. Both local authentication and remote RADIUS server authentication methods are supported. In MAC-based access control, MAC user information in a local database or a RADIUS server database is searched for authentication. Following the authentication result, users achieve different levels of authorization. Notes about MAC-based Access Control There are certain limitations and regulations regarding MAC-based access control: 1. Once this feature is enabled for a port, the Switch will clear the FDB of that port. 2. If a port is granted clearance for a MAC address in a VLAN that is not a Guest VLAN, other MAC addresses on that port must be authenticated for access and otherwise will be blocked by the Switch. 3. Ports that have been enabled for Link Aggregation and Port Security cannot be enabled for MAC-based Authentication. 4. Ports that have been enabled for GVRP cannot be enabled for Guest VLAN. MAC-based Access Control Settings This window is used to set the parameters for the MAC-based access control function on the Switch. The user can set the running state, method of authentication, RADIUS password, view the Guest VLAN configuration to be 213

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide
213
From Port / To Port
Use the drop-down menus to select a range of ports to use.
Maximum Entry
Enter the maximum entry value.
Click the
Apply
button to accept the changes made.
DHCP Snooping Entry
This window is used to view dynamic entries on specific ports.
To view this window, click
Security > IP-MAC-Port Binding (IMPB) > DHCP Snooping > DHCP Snooping Entry
as shown below:
Figure 8–24 DHCP Snooping Entry window
The fields that can be configured are described below:
Parameter
Description
Port
Use the drop-down menu to select the desired port.
Ports (e.g.: 1, 7-12)
Specify the ports for which to view DHCP snooping entries. Tick the All check box to
clear entries for all ports.
Click the
Find
button to locate a specific entry based on the port number selected.
Click the
Clear
button to clear all the information entered in the fields.
Click the
View All
button to display all the existing entries.
MAC-based Access Control (MAC)
MAC-based access control is a method to authenticate and authorize access using either a port or host. For port-
based MAC-based access control, the method decides port access rights, while for host-based MAC-based access
control, the method determines the MAC access rights.
A MAC user must be authenticated before being granted access to a network. Both local authentication and remote
RADIUS server authentication methods are supported. In MAC-based access control, MAC user information in a
local database or a RADIUS server database is searched for authentication. Following the authentication result,
users achieve different levels of authorization.
There are certain limitations and regulations regarding MAC-based access control:
Notes about MAC-based Access Control
1.
Once this feature is enabled for a port, the Switch will clear the FDB of that port.
2.
If a port is granted clearance for a MAC address in a VLAN that is not a Guest VLAN, other MAC
addresses on that port must be authenticated for access and otherwise will be blocked by the Switch.
3.
Ports that have been enabled for Link Aggregation and Port Security cannot be enabled for MAC-based
Authentication.
4.
Ports that have been enabled for GVRP cannot be enabled for Guest VLAN.
MAC-based Access Control Settings
This window is used to set the parameters for the MAC-based access control function on the Switch. The user can
set the running state, method of authentication, RADIUS password, view the Guest VLAN configuration to be