D-Link DGS-1520 Dgs-1210 Smart Managed Gigabit Switches

User Manual - Page 477

For DGS-1520.

PDF File Manual, 598 pages, Read Online | Download pdf file

DGS-1520 photo
Loading ...
Loading ...
Loading ...
DGS-1520 Series Gigabit Ethernet Smart Managed Switch Web UI Reference Guide
467
Network Access Authentication Global Settings
This window is used to display and configure the global Network Access Authentication settings.
To view the following window, click Security > Network Access Authentication > Network Access Authentication
Global Settings, as shown below:
Figure 9-79 Network Access Authentication Global Settings Window
The fields that can be configured in Network Access Authentication MAC Format Settings are described below:
Parameter Description
Case
Select the case format that will be used for the network access authentication MAC
address here. Options to choose from are Lowercase and Uppercase.
Delimiter
Select the delimiter that will be used for the network access authentication MAC
address here. Options to choose from are Hyphen, Colon, Dot, and None.
Delimiter Number Select the delimiter number option here. Options to choose from are 1, 2, and 5.
Click the Apply button to accept the changes made.
The fields that can be configured in General Settings are described below:
Parameter Description
Max Users
Enter the maximum amount of users allowed here. This value must be between 1
and 1024. By default, this value is 1024.
Deny MAC-Move
Select to enable or disable the deny MAC-move feature here. This option controls
whether to allow authenticated hosts to do roaming across different Switch ports
and only controls whether a host, which is authenticated at a port set to the multi-
authenticate mode, is allowed to move to another port.
If a station is allowed to move, there are two situations. It may either need to be re-
authenticated or directly moved to the new port without re-authentication based on
the following rule. If the new port has the same authentication configuration as the
original port, then re-authentication is not needed. The host will inherit the same
authorization attributes with new port. The authenticated host can do roaming from
port 1 to port 2, and inherit the authorization attributes without re-authentication. If
the new port has the different authentication configuration as the original port, then
re-authentication is needed. The authenticated host on port 1 can move and re-
authenticated by port 2. If the new port has no authentication method enabled,
Loading ...
Loading ...
Loading ...