D-Link DGS-3200-10 Product Manual - Page 179

Conditions and Limitations, WAC Global Settings

Page 179 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Conditions and Limitations 1. If the client is utilizing DHCP to attain an IP address, the authentication VLAN must provide a DHCP server or a DHCP relay function so that client may obtain an IP address. 2. Certain functions exist on the Switch that will filter HTTP packets, such as the Access Profile function. The user needs to be very careful wh en settin g filter functions fo r th e targ et VLAN, so that th ese HTTP p ackets are no t denied by t he Switch. 3. If a RADIUS serv er is to be used for authentication, the user must first establish a RADIUS Serv er with the appropriate parameters, including the target VLAN, before enabling Web Authentication on the Switch. WAC Global Settings Users can configure the Switch for Web authentication. To view the following window, click Security > Web-based Access Control (WAC) > WAC Global Settings: Figure 5 - 48. WAC Global Settings window To set the Web Authentication for the Switch, complete the following fields: Parameter Description WAC State Use the radio buttons to either enable or disable Web-based Access Control on the Switch. Click the adjacent Apply button to set the desired WAC State. Virtual IP Enter a virtual IP address. This address is only used by WAC and is not known by any other modules of the Switch. HTTP(s) Port (1-65535) Enter a HTTP port number. Port 80 is the default. Method Use this drop-down menu to choose the authenticator for Web-based Access Control. The user may choose: Local - Choose this parameter to use the local authentication method of the Switch as the authenticating method for users trying to access the network via the switch. This is, in fact, the username and password to access the Switch configured using the WAC User Settings window (Security > Web-based Access Control (WAC) > WAC User Settings) seen below. RADIUS - Choose this parameter to use a remote RADIUS server as the authenticating method for users trying to access the network via the switch. This RADIUS server must have already been pre-assigned by the administrator using the Authentic RADIUS Server window (Security > 802.1X > Authentic RADIUS Server). Authentication Failover Toggle between Enabled and Disabled. This is used to configure WAC authentication failover. By default, the authentication failover is Disabled. If RADIUS servers are unreachable, the authentication will fail. When the authentication failover is Enabled, if RADIUS server authentication is unreachable, the local database will be used to do the authentication. 166

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
166
Conditions and Limitations
1.
If the client is utilizing DHCP to attain an IP address, the authentication VLAN must provide a DHCP server or a DHCP
relay function so that client may obtain an IP address.
2.
Certain functions exist on the Switch that will filter HTTP packets, such as the Access Profile function. The user needs to
be very careful wh en settin g filter functions fo r th e targ et VLAN, so that th
ese HTTP p ackets are no t denied by t he
Switch.
3.
If a RADIUS server is to be used for authentication, the user must first establish a RADIUS Server with the appropriate
parameters, including the target VLAN, before enabling Web Authentication on the Switch.
WAC Global Settings
Users can configure the Switch for Web authentication.
To view the following window, click
Security
>
Web-based Access Control (WAC)
>
WAC Global Settings
:
Figure 5 - 48. WAC Global Settings window
To set the Web Authentication for the Switch, complete the following fields:
Parameter
Description
WAC State
Use the radio buttons to either enable or disable Web-based Access Control on the Switch.
Click the adjacent
Apply
button to set the desired WAC State.
Virtual IP
Enter a virtual IP address. This address is only used by WAC and is not known by any other
modules of the Switch.
HTTP(s) Port
(1-65535)
Enter a HTTP port number. Port
80
is the default.
Method
Use this drop-down menu to choose the authenticator for Web-based Access Control. The
user may choose:
Local
– Choose this parameter to use the local authentication method of the Switch as the
authenticating method for users trying to access the network via the switch. This is, in fact,
the username and password to access the Switch configured using the
WAC User Settings
window (
Security
>
Web-based Access Control (WAC)
>
WAC User Settings
) seen
below.
RADIUS
– Choose this parameter to use a remote RADIUS server as the authenticating
method for users trying to access the network via the switch. This RADIUS server must have
already been pre-assigned by the administrator using the
Authentic RADIUS Server
window
(
Security
>
802.1X
>
Authentic RADIUS Server
).
Authentication
Failover
Toggle between
Enabled
and
Disabled
. This is used to configure WAC authentication
failover. By default, the authentication failover is
Disabled
. If RADIUS servers are
unreachable, the authentication will fail. When the authentication failover is
Enabled
, if
RADIUS server authentication is unreachable, the local database will be used to do the
authentication.