EasyManuals Logo
Home>D-Link>Switch>xStack

D-Link xStack User Manual

D-Link xStack
357 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #8 background imageLoading...
Page #8 background image
802.1X........................................................................................................................................................................................ 230

Guest VLANs..............................................................................................................................................................................................235
Limitations Using the Guest VLAN ......................................................................................................................................................235
Configure 802.1X Guest VLAN .................................................................................................................................................................235
Configure 802.1X Authenticator.................................................................................................................................................................237
802.1X User................................................................................................................................................................................................240
Initialize Port(s) ..........................................................................................................................................................................................240
Reauthenticate Port(s).................................................................................................................................................................................242
Authentic RADIUS Server..........................................................................................................................................................................243
Web-based Access Control (WAC) ........................................................................................................................................... 245
Conditions and Limitations.........................................................................................................................................................................245
WAC Global State ......................................................................................................................................................................................245
WAC Port Settings......................................................................................................................................................................................247
WAC User Account....................................................................................................................................................................................249
WAC Host Table Settings...........................................................................................................................................................................250
Trust Host................................................................................................................................................................................... 251
Access Authentication Control................................................................................................................................................... 252
Authentication Policy & Parameter Settings...............................................................................................................................................253
Application's Authentication Settings.........................................................................................................................................................253
Authentication Server Group ......................................................................................................................................................................254
Authentication Server Host.........................................................................................................................................................................255
Login Method Lists.....................................................................................................................................................................................257
Enable Method Lists...................................................................................................................................................................................258
Configure Local Enable Password..............................................................................................................................................................260
Enable Admin.............................................................................................................................................................................................261
RADIUS Accounting Settings ....................................................................................................................................................................262
MAC-based Access Control (MAC).......................................................................................................................................... 264
Notes about MAC-based Access Control....................................................................................................................................................264
MAC-based Access Control Global Settings ..............................................................................................................................................264
MAC-based Access Control Local MAC Settings......................................................................................................................................267
Safeguard Engine....................................................................................................................................................................... 268
Safeguard Engine Settings ..........................................................................................................................................................................269
Traffic Segmentation.................................................................................................................................................................. 270
Secure Socket Layer (SSL)........................................................................................................................................................ 271
SSL............................................................................................................................................................................................. 272
Secure Shell (SSH)..................................................................................................................................................................... 273
SSH Server Configuration...........................................................................................................................................................................274
SSH Authentication Mode and Algorithm Settings ....................................................................................................................................275
SSH User Authentication Mode..................................................................................................................................................................277
Compound Authentication......................................................................................................................................................... 278
Compound Authentication Settings.............................................................................................................................................................278
Authentication Guest VLAN Settings.........................................................................................................................................................280
JWAC (Japanese Web-based Access Control)........................................................................................................................... 281
JWAC Global Configuration.......................................................................................................................................................................281
JWAC Port Settings....................................................................................................................................................................................284

Table of Contents

Other manuals for D-Link xStack

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack and is the answer not in the manual?

D-Link xStack Specifications

General IconGeneral
BrandD-Link
ModelxStack
CategorySwitch
LanguageEnglish

Related product manuals