D-Link DGS-3200-10 Product Manual - Page 148

Guest VLAN, Limitations Using the Guest VLAN

Page 148 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Guest VLAN On 802 .1X secu rity-enabled n etworks, t here is a need fo r non 802.1X supported de vices to gain limited access to the net work, due t o l ack of t he p roper 80 2.1X s oftware or i ncompatible devices, s uch as c omputers r unning Windows 98 or ol der operating systems, or the ne ed for guests to gain access to the network without full authorization or l ocal authentication on the Switch. To s upplement these ci rcumstances, th is switch now implements 802.1X Gue st V LANs. These VLA Ns should ha ve limited access rights and feat ures separate from other VLANs on the network. To implement 802.1X Guest VLANs, the user must first create a VLAN on the network with limited rights and then enable it as an 802.1X guest VLAN. Then the administrator must configure the guest accounts accessing the Switch t o be placed i n a Guest VLAN when trying to access the Switch. Upon initial entry to the Switch, the client wishing services on the Switch will need to be authenticated by a remote RADIUS Server or local authentication on th e Switch to be p laced in a fully op erational VLAN. If authenticated and t he a uthenticator possesses the VL AN placement information, that client will be ac cepted into the fully operational targ et VLAN and no rmal switch fu nctions will b e open to the client. If the authenticator does not have target VLAN placement inform ation, the clie nt will be ret urned to its originating VLAN. Yet, if the clien t is denied au thentication by the authenticator, it will be placed in the Guest VLAN where it has limited rights and access. The adjacent figure should give the user a better understanding of the Guest VLAN process. Limitations Using the Guest VLAN Figure 5- 15. Guest VLAN Authentication Process 1. Ports supporting Guest VLANs cannot be GVRP enabled and vice versa. 2. A port cannot be a member of a Guest VLAN and a static VLAN simultaneously. 3. Once a client has been accepted into the target VLAN, it can no longer access the Guest VLAN. 4. If a port is a member of multiple VLANs, it cannot become a member of the Guest VLAN. To view the following window, click Security > 802.1X > Guest VLAN: Figure 5 - 16. Guest VLAN window Remember, to set an 8 02.1X guest VLAN, the user m ust first configure a normal VLAN, which can be enabled here for guest VLAN status. The following fields may be modified to enable the 802.1X guest VLAN: Parameter Description VLAN Name Port Enter the pre-configured VLAN name to create as an 802.1X guest VLAN. Set the ports to be enabled for the 802.1X guest VLAN. Click Apply to implement the guest VLAN settings entered. Only one VLAN may be assigned as the 802.1X guest VLAN. 135

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
135
Guest VLAN
On 802 .1X secu rity-enabled n etworks, t here is a
need fo r non -
802.1X supported de vices to gain limited access to the net
work,
due t o l ack of t he p roper 80 2.1X s oftware or i ncompatible
devices, s
uch as c
omputers r unning Windows 98 or ol der
operating systems, or the need for guests to gain access to the
network without full authorization or local authentication on the
Switch. To s upplement these ci
rcumstances, this switch now
implements 802.1X Gue st V LANs. These VLA Ns should ha ve
limited access rights and feat ures separate from other VLANs on
the network.
Figure 5- 15. Guest VLAN Authentication Process
To implement 802.1X Guest VLANs, the user must first create a
VLAN on the network with limited rights and then enable it as an
802.1X guest VLAN. Then the administrator must configure the
guest accounts accessing the
Switch t
o be placed i
n a Guest
VLAN when trying to access the Switch. Upon initial entry to the
Switch, the client wishing services on the Switch will need to be
authenticated by a remote RADIUS Server or local authentication
on th e Switch to
be p
laced in a
fully op erational VLAN. If
authenticated and t
he a
uthenticator possesses the VLAN
placement information, that client will be accepted into the fully
operational targ et VLAN and
no rmal switch fu nctions will b e
open to the client. If the authenticator does not have target VLAN
placement inform
ation, the
clie
nt will be ret
urned to its
originating VLAN. Yet, if the clien t is denied au thentication by
the authenticator, it will be placed
in the Guest VLAN where it
has limited rights and access. The adjacent figure should give the
user a better understanding of the Guest VLAN process.
Limitations Using the Guest VLAN
1.
Ports supporting Guest VLANs cannot be GVRP enabled and vice versa.
2.
A port cannot be a member of a Guest VLAN and a static VLAN simultaneously.
3.
Once a client has been accepted into the target VLAN, it can no longer access the Guest VLAN.
4.
If a port is a member of multiple VLANs, it cannot become a member of the Guest VLAN.
To view the following window, click
Security
>
802.1X
>
Guest VLAN
:
Figure 5 - 16. Guest VLAN window
Remember, to set an 802.1X guest VLAN, the user must first configure a normal VLAN, which can be enabled here for guest
VLAN status.
The following fields may be modified to enable the 802.1X guest VLAN:
Parameter
Description
VLAN Name
Enter the pre-configured VLAN name to create as an 802.1X guest VLAN.
Port
Set the ports to be enabled for the 802.1X guest VLAN.
Click
Apply
to implement the guest VLAN settings entered. Only one VLAN may be assigned as the 802.1X guest VLAN.