D-Link DGS-1520 Dgs-1210 Smart Managed Gigabit Switches

User Manual - Page 479

For DGS-1520.

PDF File Manual, 598 pages, Read Online | Download pdf file

DGS-1520 photo
Loading ...
Loading ...
Loading ...
DGS-1520 Series Gigabit Ethernet Smart Managed Switch Web UI Reference Guide
469
The fields that can be configured are described below:
Parameter Description
Unit
Select the Switch unit that will be used for this configuration here.
From Port - To Port
Select the appropriate port range used for the configuration here.
Host Mode
Select the host mode option that will be associated with the selected port(s) here.
Options to choose from are Multi Host and Multi Auth. If the port is operated in
the multi-host mode, and if one of the hosts is authenticated, then all other hosts
are allowed to access the port. According to 802.1X authentication, if the re-
authentication fails or the authenticated user logs off, the port will be blocked for a
quiet period. The port restores the processing of EAPOL packets after the quiet
period. If the port is operated in the multi-authenticated mode, then each host
needs to be authenticated individually to access the port. A host is represented by
its MAC address. Only the authorized host is allowed to access.
VID List Action Select the VID list action here. Options to choose from are None, Add, and
Delete.
VID List After selecting the Multi Auth option as the Host Mode, the following parameter is
available. Enter the VLAN ID used here. This is useful when different VLANs on
the Switch have different authentication requirements. After the client is
authenticated, the client will not be re-authenticated when received from other
VLANs. This option is useful for trunk ports to do per-VLAN authentication control.
When a port's authentication mode is changed to multi-host, the previous
authentication VLAN(s) on this port will be cleared.
CompAuth Mode
Select the compound authentication mode option here. Options to choose from
are:
• Any - Specifies that if any of the authentication method (802.1X, MAC-
based Access Control or WAC) to passes, then pass.
• MAC-WAC - Specifies to verify MAC-based authentication first. If the client
passes, WAC will be verified next. Both authentication methods need to be
passed.
Max Users
Enter the maximum users value used here. This value must be between 1 and
1024.
Periodic
Select to enable or disable periodic re-authentication for the selected port here.
This parameter only affects the 802.1X protocol.
ReAuth Timer
Enter the re-authentication timer value here. This value must be between 1 and
65535 seconds. By default, this value is 3600 seconds.
Inactivity State
Select to enable or disable the inactivity state here.
Inactivity Timer When the Inactivity State is enabled, enter the inactivity timer value here. This
value must be between 120 and 65535 seconds. This parameter only affects the
WAC authentication protocol.
Restart
Enter the restart time value used here. This value must be between 1 and 65535
seconds.
Click the Apply button to accept the changes made.
Loading ...
Loading ...
Loading ...