D-Link DGS-3200-10 Product Manual - Page 6

xStack, DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch

Page 6 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Port Lock Entries ...132 DHCP Server Screening...133 DHCP Screening Port Settings...133 DHCP Offer Filtering...134 Guest VLAN ...135 802.1X (Port-based and Host-based Access Control) ...136 Authentication Server ...137 Authenticator ...137 Client ...138 Authentication Process ...138 Understanding 802.1X Port-based and Host-based Network Access Control 139 802.1X Settings...141 802.1X User ...142 Initialize Port(s) ...143 Reauthenticate Port(s) ...144 Authentic RADIUS Server...145 SSL Settings...146 SSH ...148 SSH Configuration...149 SSH Authmode and Algorithm Settings ...150 SSH User Authentication Mode...152 Access Authentication Control...153 Authentication Policy and Parameter Settings ...154 Application Authentication Settings ...154 Authentication Server Group ...155 Authentication Server Host ...157 Login Method Lists...158 Enable Method Lists ...159 Configure Local Enable Password ...160 Enable Admin ...160 MAC-based Access Control (MAC) ...161 MAC Settings ...161 MAC Local Settings...164 Web-based Access Control (WAC) ...164 WAC Global Settings...166 WAC User Settings...167 WAC Port Settings...169 Japanese Web-based Access Control (JWAC)...170 JWAC Global Settings ...170 JWAC Port Settings ...172 JWAC User Settings ...173 JWAC Customize Page Language ...173 JWAC Customize Page...174 Multiple Authentication ...174 Authorization Network State Settings...177 vi

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
vi
Port Lock Entries
........................................................................................................................................................................................
132
DHCP Server Screening
.............................................................................................................................................................
133
DHCP Screening Port Settings
....................................................................................................................................................................
133
DHCP Offer Filtering
..................................................................................................................................................................................
134
Guest VLAN
..............................................................................................................................................................................
135
802.1X (Port-based and Host-based Access Control)
................................................................................................................
136
Authentication Server
............................................................................................................................................................................
137
Authenticator
.........................................................................................................................................................................................
137
Client
.....................................................................................................................................................................................................
138
Authentication Process
..........................................................................................................................................................................
138
Understanding 802.1X Port-based and Host-based Network Access Control
........................................................................................
139
802.1X Settings
...........................................................................................................................................................................................
141
802.1X User
................................................................................................................................................................................................
142
Initialize Port(s)
..........................................................................................................................................................................................
143
Reauthenticate Port(s)
.................................................................................................................................................................................
144
Authentic RADIUS Server
..........................................................................................................................................................................
145
SSL Settings
...............................................................................................................................................................................
146
SSH
............................................................................................................................................................................................
148
SSH Configuration
......................................................................................................................................................................................
149
SSH Authmode and Algorithm Settings
.....................................................................................................................................................
150
SSH User Authentication Mode
..................................................................................................................................................................
152
Access Authentication Control
...................................................................................................................................................
153
Authentication Policy and Parameter Settings
............................................................................................................................................
154
Application Authentication Settings
...........................................................................................................................................................
154
Authentication Server Group
......................................................................................................................................................................
155
Authentication Server Host
.........................................................................................................................................................................
157
Login Method Lists
.....................................................................................................................................................................................
158
Enable Method Lists
...................................................................................................................................................................................
159
Configure Local Enable Password
..............................................................................................................................................................
160
Enable Admin
.............................................................................................................................................................................................
160
MAC-based Access Control (MAC)
..........................................................................................................................................
161
MAC Settings
.............................................................................................................................................................................................
161
MAC Local Settings
....................................................................................................................................................................................
164
Web-based Access Control (WAC)
...........................................................................................................................................
164
WAC Global Settings
..................................................................................................................................................................................
166
WAC User Settings
.....................................................................................................................................................................................
167
WAC Port Settings
......................................................................................................................................................................................
169
Japanese Web-based Access Control (JWAC)
...........................................................................................................................
170
JWAC Global Settings
................................................................................................................................................................................
170
JWAC Port Settings
....................................................................................................................................................................................
172
JWAC User Settings
...................................................................................................................................................................................
173
JWAC Customize Page Language
..............................................................................................................................................................
173
JWAC Customize Page
...............................................................................................................................................................................
174
Multiple Authentication
.............................................................................................................................................................
174
Authorization Network State Settings
.........................................................................................................................................................
177