D-Link DGS-3426P Product Manual - Page 349

X + IMPB Mode, IMPB + JWAC Mode, Compound Authentication Global Settings

Page 349 highlights

xStack® DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch 802.1X + IMPB Mode This mode adds an extra layer of security by checking the IP MAC-Binding Port Binding (IMPB) table before trying one of the supported authentication methods. The IMPB Table is used to create a "white list" that checks if the IP streams being sent by authorized hosts have been granted or not. In the above diagram the Switch port has been configured to allow clients to authenticate using 802.1X. If the client is in the IMPB table and tries to connect to the network using this authentication method and the client is listed in the white list for legal IP/MAC/port checking, access will be granted. If a client fails one of the authentication methods, access will be denied. Figure 6 - 75 802.1X + IMPB Mode example IMPB + JWAC Mode This mode adds an extra layer of security by checking the IP MAC-Binding Port Binding (IMPB) table before trying one of the supported authentication methods. The IMPB Table is used to create a 'white-list' that checks if the IP streams being sent by authorized hosts have been granted or not. In the above diagram, the Switch port has been configured to allow clients to authenticate using either JWAC. If the client is in the IMPB table and tries to connect to the network using either of these supported authentication methods and the client is listed in the white list for legal IP/MAC/port checking, access will be granted. If a client fails one of the authentication methods, access will be denied. Figure 6 - 76 IMPB + JWAC Mode example Compound Authentication Global Settings To view this window, click Security > Compound Authentication > Compound Authentication Global Settings, as shown below. Figure 6 - 77 Compound Authentication Global Settings window Use the pull-down menu to select the authentication server failover state. Parameter Description Block If Block is selected, the client is always regarded as an un-authenticated. Local If Local is selected, the Switch will resort to using the local database to authenticate the client. If the client fails on local authentication, the client is regarded as un-authenticated. Otherwise, the client is regarded as an authenticated. 340

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
340
802.1X + IMPB Mode
This mode adds an extra layer of security by checking the IP
MAC-Binding Port Binding (IMPB) table before trying one
of the supported authentication methods. The IMPB Table is
used to create a “white list” that checks if the IP streams
being sent by authorized hosts have been granted or not. In
the above diagram the Switch port has been configured to
allow clients to authenticate using 802.1X. If the client is in
the IMPB table and tries to connect to the network using this
authentication method and the client is listed in the white list
for legal IP/MAC/port checking, access will be granted. If a
client fails one of the authentication methods, access will be
denied.
Figure 6 - 75 802.1X + IMPB Mode example
IMPB + JWAC Mode
This mode adds an extra layer of security by checking the IP
MAC-Binding Port Binding (IMPB) table before trying one
of the supported authentication methods. The IMPB Table is
used to create a ‘white-list’ that checks if the IP streams being
sent by authorized hosts have been granted or not. In the
above diagram, the Switch port has been configured to allow
clients to authenticate using either JWAC. If the client is in
the IMPB table and tries to connect to the network using
either of these supported authentication methods and the
client is listed in the white list for legal IP/MAC/port
checking, access will be granted. If a client fails one of the
authentication methods, access will be denied.
Figure 6 - 76 IMPB + JWAC Mode example
Compound Authentication Global Settings
To view this window, click
Security > Compound Authentication > Compound Authentication Global Settings
, as shown
below.
Figure 6 - 77 Compound Authentication Global Settings window
Use the pull-down menu to select the authentication server failover state.
Parameter
Description
Block
If
Block
is selected, the client is always regarded as an un-authenticated.
Local
If
Local
is selected, the Switch will resort to using the local database to authenticate the client.
If the client fails on local authentication, the client is regarded as un-authenticated. Otherwise,
the client is regarded as an authenticated.