D-Link DGS-3630-28SC Quick installation Guide - Page 552
Network Access Authentication MAC Format Settings, Deny MAC-Move
View all D-Link DGS-3630-28SC manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 552 highlights
DGS-3630 Series Layer 3 Stackable Managed Switch Web UI Reference Guide The fields that can be configured in Network Access Authentication MAC Format Settings are described below: Parameter Case Delimiter Delimiter Number Description Select the case format that will be used for the network access authentication MAC address here. Options to choose from are Lowercase and Uppercase. Select the delimiter that will be used for the network access authentication MAC address here. Options to choose from are Hyphen, Colon, Dot, and None. Select the delimiter number option here. Options to choose from are 1, 2, and 5. Click the Apply button to accept the changes made. The fields that can be configured in General Settings are described below: Parameter Max Users Deny MAC-Move Authorization State Description Enter the maximum amount of users allowed here. This value must be between 1 and 1000. By default, this option is 1000. Select to enable or disable the deny MAC-move feature here. This option controls whether to allow authenticated hosts to do roaming across different Switch ports and only controls whether a host, which is authenticated at a port set to the multiauthenticate mode, is allowed to move to another port. If a station is allowed to move, there are two situations. It may either need to be re-authenticated or directly moved to the new port without re-authentication based on the following rule. If the new port has the same authentication configuration as the original port, then re-authentication is not needed. The host will inherit the same authorization attributes with new port. The authenticated host can do roaming from port 1 to port 2, and inherit the authorization attributes without reauthentication. If the new port has the different authentication configuration as the original port, then re-authentication is needed. The authenticated host on port 1 can move and re-authenticated by port 2. If the new port has no authentication method enabled, then the station is directly moved to the new port. The session with the original port is removed. The authenticated host on port 1 can be moved to port 2. If this feature is disabled and an authenticated host moves to another port, then this is treated as a violation error. Select to enable or disable the authorized state here. The option is used to enable or disable the acceptance of an authorized configuration. When authorization is enabled for authentication, the authorized attributes (for example VLAN, 802.1p default priority, bandwidth, and ACL) assigned by the RADIUS server will be accepted if the authorization status is enabled. Bandwidth and ACL are assigned on a per-port basis. If in the multi-authenticated mode, VLAN and 802.1p are assigned on a per-host basis. Otherwise, Bandwidth and ACL are assigned on a per-port basis. Click the Apply button to accept the changes made. The fields that can be configured in User Information are described below: Parameter User Name VID Password Type Password Description Enter the user name used here. This name can be up to 32 characters long. Enter the VLAN ID used here. Select the password type option here. Options to choose from are Plain Text and Encrypted. Enter the password used here. Click the Apply button to accept the changes made. Click the Delete button to remove the specified entry. 540