D-Link DGS-3426P Product Manual - Page 337

MAC-based Access Control Local MAC Settings

Page 337 highlights

xStack® DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch Aging Time (1-1440 min) Specifies a time period (configurable per port) between 1-1440 minutes, during which an authenticated host will stay in an authenticated state. When the aging time has expired, the host will be moved back to an unauthenticated state. When aging time is set to Infinite, it will disable the aging time. Block Time (1-300sec) If a host fails to pass the authentication it will be blocked for a period of time referred to as block time (per port configurable). During this time, this host can't proceed to the authenticating process (unless the user clears the database manually). As a result, this hold mechanism can prevent the switch from frequent authentication which consumes too much computing power. Click Apply to implement changes made. MAC-based Access Control Local MAC Settings The following window is used to set a list of MAC addresses, along with their corresponding target VLAN, which will be authenticated for the Switch. Once a queried MAC address is matched in this table, it will be placed in the VLAN associated with it here. The switch administrator may enter up to 1024 MAC addresses to be authenticated using the local method configured here. To view this window, click Security > MAC-based Access Control > MAC-based Access Control Local MAC Settings, as shown below. Figure 6 - 59 MAC-based Access Control Local MAC Settings window To add a MAC address to the local authentication list, enter the MAC address and the target VLAN name into their appropriate fields and click Add. To clear a VLAN click Clear VLAN. To change a MAC address or a VLAN in the list, click the corresponding Modify button. To delete an entry by MAC or VLAN, enter its parameters into the appropriate field and click Delete By MAC or Delete By VLAN. To find an entry by MAC or VLAN, enter its parameters into the appropriate fields and click Find By MAC or Find By VLAN. Figure 6 - 60 MAC-based Access Control Local MAC Settings - Edit window 328

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
328
Aging Time (1-1440 min)
Specifies a time period (configurable per port) between 1-1440 minutes, during which
an authenticated host will stay in an authenticated state. When the aging time has
expired, the host will be moved back to an unauthenticated state. When aging time is
set to Infinite, it will disable the aging time.
Block Time (1-300sec)
If a host fails to pass the authentication it will be blocked for a period of time referred to
as block time (per port configurable). During this time, this host can't proceed to the
authenticating process (unless the user clears the database manually). As a result, this
hold mechanism can prevent the switch from frequent authentication which consumes
too much computing power.
Click
Apply
to implement changes made.
MAC-based Access Control Local MAC Settings
The following window is used to set a list of MAC addresses, along with their corresponding target VLAN, which will be
authenticated for the Switch. Once a queried MAC address is matched in this table, it will be placed in the VLAN associated with
it here. The switch administrator may enter up to 1024 MAC addresses to be authenticated using the local method configured here.
To view this window, click
Security > MAC-based Access Control > MAC-based Access Control Local MAC Settings
, as
shown below.
Figure 6 - 59 MAC-based Access Control Local MAC Settings window
To add a MAC address to the local authentication list, enter the MAC address and the target VLAN name into their appropriate
fields and click
Add
. To clear a VLAN click
Clear VLAN
. To change a MAC address or a VLAN in the list, click the
corresponding
Modify
button. To delete an entry by MAC or VLAN, enter its parameters into the appropriate field and click
Delete By MAC
or
Delete By VLAN
. To find an entry by MAC or VLAN, enter its parameters into the appropriate fields and
click
Find By MAC
or
Find By VLAN
.
Figure 6 - 60 MAC-based Access Control Local MAC Settings - Edit window