D-Link DGS-3620-28TC-SI Product Manual - Page 346

IP-MAC-Port Binding (IMPB), IMPB Global Settings

Page 346 highlights

xStack® DGS-3620 Series Managed Switch Web UI Reference Guide BadAuthenticators The number of RADIUS Accounting-Response packets, which contained invalid authenticators, received from this server. PendingRequests The number of RADIUS Accounting-Request packets sent to this server that have not yet timed out or received a response. This variable is incremented when an Accounting-Request is sent and decremented due to receipt of an AccountingResponse, a timeout or a retransmission. Timeouts The number of accounting timeouts to this server. After a timeout the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as an Accounting-Request as well as a timeout. UnknownTypes The number of RADIUS packets of unknown type which were received from this server on the accounting port. PacketsDropped The number of RADIUS packets, which were received from this server on the accounting port and dropped for some other reason. Click the Clear button to clear the current statistics shown. IP-MAC-Port Binding (IMPB) The IP network layer uses a IPv4/IPv6 address. The Ethernet link layer uses a MAC address. Binding these two address types together allows the transmission of data between the layers. The primary purpose of IP-MAC-port binding is to restrict the access to a switch to a number of authorized users. Authorized clients can access a switch's port by either checking the pair of IP-MAC addresses with the pre-configured database or if DHCP snooping has been enabled in which case the switch will automatically learn the IP/MAC pairs by snooping DHCP packets and saving them to the IMPB white list. If an unauthorized user tries to access an IP-MAC binding enabled port, the system will block the access by dropping its packet. For the xStack® DGS-3620 series of switches, active and inactive entries use the same database. The maximum number of IPv4/IPv6 entries is 510/511. The creation of authorized users can be manually configured by CLI or Web. The function is port-based, meaning a user can enable or disable the function on the individual port. IMPB Global Settings Users can enable or disable the Trap/Log State and DHCP Snoop state on the Switch. The Trap/Log field will enable and disable the sending of trap/log messages for IP-MAC-port binding. When enabled, the Switch will send a trap message to the SNMP agent and the Switch log when an ARP/IP packet is received that doesn't match the IP-MAC-port binding configuration set on the Switch. To view this window, click Security > IP-MAC-Port Binding (IMPB) > IMPB Global Settings as shown below: Figure 8-26 IMPB Global Settings The fields that can be configured are described below: Parameter Description Trap / Log Click the radio buttons to enable or disable the sending of trap/log messages for IPMAC-port binding. When Enabled, the Switch will send a trap message to the SNMP agent and the Switch log when an ARP/IP packet is received that doesn't match the IP-MAC-port binding configuration set on the Switch. The default is Disabled. 336

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502

xStack® DGS-3620 Series Managed Switch Web UI Reference Guide
336
BadAuthenticators
The number of RADIUS Accounting-Response packets, which contained invalid
authenticators, received from this server.
PendingRequests
The number of RADIUS Accounting-Request packets sent to this server that have not
yet timed out or received a response. This variable is incremented when an
Accounting-Request is sent and decremented due to receipt of an Accounting-
Response, a timeout or a retransmission.
Timeouts
The number of accounting timeouts to this server. After a timeout the client may retry
to the same server, send to a different server, or give up. A retry to the same server is
counted as a retransmit as well as a timeout. A send to a different server is counted
as an Accounting-Request as well as a timeout.
UnknownTypes
The number of RADIUS packets of unknown type which were received from this
server on the accounting port.
PacketsDropped
The number of RADIUS packets, which were received from this server on the
accounting port and dropped for some other reason.
Click the
Clear
button to clear the current statistics shown.
IP-MAC-Port Binding (IMPB)
The IP network layer uses a IPv4/IPv6 address. The Ethernet link layer uses a MAC address. Binding these two
address types together allows the transmission of data between the layers. The primary purpose of IP-MAC-port
binding is to restrict the access to a switch to a number of authorized users. Authorized clients can access a
switch’s port by either checking the pair of IP-MAC addresses with the pre-configured database or if DHCP
snooping has been enabled in which case the switch will automatically learn the IP/MAC pairs by snooping DHCP
packets and saving them to the IMPB white list. If an unauthorized user tries to access an IP-MAC binding enabled
port, the system will block the access by dropping its packet. For the xStack
®
DGS-3620 series of switches, active
and inactive entries use the same database. The maximum number of IPv4/IPv6 entries is 510/511. The creation of
authorized users can be manually configured by CLI or Web. The function is port-based, meaning a user can
enable or disable the function on the individual port.
IMPB Global Settings
Users can enable or disable the Trap/Log State and DHCP Snoop state on the Switch. The Trap/Log
field will
enable and disable the sending of trap/log messages for IP-MAC-port binding. When enabled, the Switch will send
a trap message to the SNMP agent and the Switch log when an ARP/IP packet is received that doesn’t match the
IP-MAC-port binding configuration set on the Switch.
To view this window, click
Security > IP-MAC-Port Binding (IMPB) > IMPB Global Settings
as shown below:
Figure 8-26 IMPB Global Settings
The fields that can be configured are described below:
Parameter
Description
Trap / Log
Click the radio buttons to enable or disable the sending of trap/log messages for IP-
MAC-port binding. When
Enabled
, the Switch will send a trap message to the SNMP
agent and the Switch log when an ARP/IP packet is received that doesn’t match the
IP-MAC-port binding configuration set on the Switch. The default is
Disabled
.