D-Link DGS-3130 Gigabit Layer 3 Stackable Managed Switches

User Manual - Page 369

For DGS-3130.

PDF File Manual, 489 pages, Read Online | Download pdf file

DGS-3130 photo
Loading ...
Loading ...
Loading ...
DGS-3130 Series Layer 3 Stackable Managed Switch Web UI Reference Guide
358
Parameter Description
Unit Select the Switch unit that will be used for this configuration here.
From Port - To Port Select the appropriate port range used for the configuration here.
Host Mode Select the host mode option that will be associated with the selected port(s)
here. Options to choose from are Multi Host and Multi Auth. If the port is
operated in the multi-host mode, and if one of the hosts is authenticated, then
all other hosts are allowed to access the port. According to 802.1X
authentication, if the re-authentication fails or the authenticated user logs off,
the port will be blocked for a quiet period. The port restores the processing of
EAPOL packets after the quiet period. If the port is operated in the multi-
authenticated mode, then each host needs to be authenticated individually to
access the port. A host is represented by its MAC address. Only the authorized
host is allowed to access.
VID List Action Select the VID list action here. Options to choose from are None, Add, and
Delete.
VID List
After selecting the Multi Auth option as the Host Mode, the following
parameter is available. Enter the VLAN ID used here. This is useful when
different VLANs on the Switch have different authentication requirements. After
the client is authenticated, the client will not be re-authenticated when received
from other VLANs. This option is useful for trunk ports to do per-VLAN
authentication control. When a port’s authentication mode is changed to multi-
host, the previous authentication VLAN(s) on this port will be cleared.
CompAuth Mode
Select the compound authentication mode option here. Options to choose from
are Any and MAC-WAC.
• Selecting Any specifies that if any of the authentication method (802.1X,
MAC-based Access Control or WAC) to passes, then pass.
• Selecting MAC-WAC specifies to verify MAC-based authentication first. If
the client passes, WAC will be verified next. Both authentication methods
need to be passed.
Max Users Enter the maximum users value used here. This value must be between 1 and
1000.
Periodic
Select to enable or disable periodic re-authentication for the selected port here.
This parameter only affects the 802.1X protocol.
ReAuth Timer Enter the re-authentication timer value here. This value must be between 1 and
86400 seconds. By default, this value is 3600 seconds.
Inactivity State Select to enable or disable the inactivity state here. Select the Time option to
enable this feature.
Inactivity Timer
When the Inactivity State is enabled, enter the inactivity timer value here. This
value must be between 120 and 65535 seconds. This parameter only affects
the WAC authentication protocol.
Restart
Enter the restart time value used here. This value must be between 1 and
65535 seconds.
Click the Apply button to accept the changes made.
Network Access Authentication Sessions Information
This window is used to view and clear the network access authentication session information.
To view the following window, click Security > Network Access Authentication > Network Access Authentication
Sessions Information, as shown below:
Loading ...
Loading ...
Loading ...