D-Link DGS-3426P Product Manual - Page 334

MAC-based Access Control (MAC), Notes about MAC-based Access Control

Page 334 highlights

xStack® DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch MAC-based Access Control (MAC) The MAC-based Access Control feature will allow users to configure a list of MAC addresses, either locally or on a remote RADIUS server, to be authenticated by the Switch and given access rights based on the configurations set on the Switch of the target VLAN where these authenticated users are placed. For local authentication on the Switch, the user must enter a list of MAC addresses to be accepted through this mechanism using the MAC-based Access Control Local Database Settings window, as seen below. The user may enter up to 1024 MAC addresses locally on the Switch. Once a MAC addresses has been authenticated by the Switch on the local side, the port where that MAC address resides will be placed in the previously configured target VLAN, where the rights and privileges are set by the switch administrator. If the VLAN Name for the target VLAN is not found by the Switch, the Switch will return the port containing that MAC address to the originating VLAN. If the MAC address is not found and the port is in the Guest VLAN, it will remain in the Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by the Switch. For remote RADIUS server authentication, the user must first configure the RADIUS server with a list of MAC addresses and relative target VLANs that are to be authenticated on the Switch. Once a MAC address has been discovered by the Switch, the Switch will then query the remote RADIUS server with this potential MAC address, using a RADIUS Access Request packet. If a match is made with this MAC address, the RADIUS server will return a notification stating that the MAC address has been accepted and is to be placed in the target VLAN. If the VID for the target VLAN is not found, the Switch will return the port containing the MAC address to the original VLAN. If the MAC address is not found, and if the port is in the Guest VLAN, it will remain in the Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by the Switch. Notes about MAC-based Access Control There are certain limitations and regulations regarding the MAC-based Access Control: 1. Once this feature is enabled for a port, the Switch will clear the FDB of that port. 2. MAC-based Access Control is its own entity and is not dependant on other authentication functions on the Switch, such as 802.1X, Web-Based authentication etc. 3. Ports that have been enabled for Link Aggregation and Port Security cannot be enabled for MAC-based Authentication. 4. Ports that have been enabled for GVRP cannot be enabled for Guest VLAN. MAC-based Access Control Global Settings The following window is used to set the parameters for the MAC-based Access Control function on the Switch. Here the user can set the state, password, authentication method, as well as create, configure or delete Guest VLANs. To view this window, click Security > MAC-based Access Control > MAC-based Access Control Global Settings, as shown below. 325

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
325
MAC-based Access Control (MAC)
The MAC-based Access Control feature will allow users to configure a list of MAC addresses, either locally or on a remote
RADIUS server, to be authenticated by the Switch and given access rights based on the configurations set on the Switch of the
target VLAN where these authenticated users are placed.
For local authentication on the Switch, the user must enter a list of MAC addresses to be accepted through this mechanism using
the MAC-based Access Control Local Database Settings window, as seen below. The user may enter up to 1024 MAC addresses
locally on the Switch. Once a MAC addresses has been authenticated by the Switch on the local side, the port where that MAC
address resides will be placed in the previously configured target VLAN, where the rights and privileges are set by the switch
administrator. If the VLAN Name for the target VLAN is not found by the Switch, the Switch will return the port containing that
MAC address to the originating VLAN. If the MAC address is not found and the port is in the Guest VLAN, it will remain in the
Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by the Switch.
For remote RADIUS server authentication, the user must first configure the RADIUS server with a list of MAC addresses and
relative target VLANs that are to be authenticated on the Switch. Once a MAC address has been discovered by the Switch, the
Switch will then query the remote RADIUS server with this potential MAC address, using a RADIUS Access Request packet. If a
match is made with this MAC address, the RADIUS server will return a notification stating that the MAC address has been
accepted and is to be placed in the target VLAN. If the VID for the target VLAN is not found, the Switch will return the port
containing the MAC address to the original VLAN. If the MAC address is not found, and if the port is in the Guest VLAN, it will
remain in the Guest VLAN, with the associated rights. If the port is not in the guest VLAN, this MAC address will be blocked by
the Switch.
Notes about MAC-based Access Control
There are certain limitations and regulations regarding the MAC-based Access Control:
1.
Once this feature is enabled for a port, the Switch will clear the FDB of that port.
2.
MAC-based Access Control is its own entity and is not dependant on other authentication functions on the Switch, such
as 802.1X, Web-Based authentication etc.
3.
Ports that have been enabled for Link Aggregation and Port Security cannot be enabled for MAC-based Authentication.
4.
Ports that have been enabled for GVRP cannot be enabled for Guest VLAN.
MAC-based Access Control Global Settings
The following window is used to set the parameters for the MAC-based Access Control function on the Switch. Here the user can
set the state, password, authentication method, as well as create, configure or delete Guest VLANs.
To view this window, click
Security > MAC-based Access Control > MAC-based Access Control Global Settings
, as shown
below.