D-Link DXS-3610 User Manual - Page 555
Network Access Authentication Global Settings
View all D-Link DXS-3610 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 555 highlights
DXS-3610 Series Layer 3 Stackable 10GbE Managed Switch Web UI Reference Guide Network Access Authentication Global Settings This window is used to display and configure the global Network Access Authentication settings. To view the following window, click Security > Network Access Authentication > Network Access Authentication Global Settings, as shown below: Figure 9-76 Network Access Authentication Global Settings Window The fields that can be configured in Network Access Authentication MAC Format Settings are described below: Parameter Case Delimiter Delimiter Number Description Select the case format that will be used for the network access authentication MAC address here. Options to choose from are Lowercase and Uppercase. Select the delimiter that will be used for the network access authentication MAC address here. Options to choose from are Hyphen, Colon, Dot, and None. Select the delimiter number option here. Options to choose from are 1, 2, and 5. Click the Apply button to accept the changes made. The fields that can be configured in General Settings are described below: Parameter Max Users Deny MAC-Move Description Enter the maximum amount of users allowed here. The range is from 1 to 4096. By default, this value is 4096. Select to enable or disable the deny MAC-move feature here. This option controls whether to allow authenticated hosts to do roaming across different Switch ports and only controls whether a host, which is authenticated at a port set to the multiauthenticate mode, is allowed to move to another port. If a station is allowed to move, there are two situations. It may either need to be reauthenticated or directly moved to the new port without re-authentication based on the following rule. If the new port has the same authentication configuration as the original port, then re-authentication is not needed. The host will inherit the same authorization attributes with new port. The authenticated host can do roaming from port 1 to port 2, and inherit the authorization attributes without re-authentication. If the new port has the different authentication configuration as the original port, then re-authentication is needed. The authenticated host on port 1 can move and reauthenticated by port 2. If the new port has no authentication method enabled, 544