D-Link 28 Switch User Manual


 
xStack
®
DES-3200-10/18/28/28F Layer 2 Ethernet Managed Switch User Manual
v
Priority Mapping ........................................................................................................................................................ 112
TOS Mapping ............................................................................................................................................................ 113
DSCP Mapping ......................................................................................................................................................... 114
Security ....................................................................................................................................... 115
Safeguard Engine ..................................................................................................................................................... 115
Trusted Host ............................................................................................................................................................. 117
IP-MAC-Port Binding ................................................................................................................................................ 117
IMP Binding Global Settings .................................................................................................................................................. 117
IMP Binding Port Settings ...................................................................................................................................................... 118
IMP Binding Entry Settings .................................................................................................................................................... 119
DHCP Snooping Entries ........................................................................................................................................................ 120
MAC Block List ....................................................................................................................................................................... 120
Port Security ............................................................................................................................................................. 120
Port Security Port Settings ..................................................................................................................................................... 120
Port Security FDB Entries ...................................................................................................................................................... 122
802.1X ....................................................................................................................................................................... 122
Understanding 802.1X Port-based and MAC-based Network Access Control ....................................................................... 125
Port-Based Network Access Control ...................................................................................................................................... 125
MAC-Based Network Access Control .................................................................................................................................... 126
802.1X Settings ...................................................................................................................................................................... 127
802.1X User ........................................................................................................................................................................... 128
Authentication RADIUS Server .............................................................................................................................................. 129
Guest VLAN Configuration ..................................................................................................................................................... 130
Guest VLAN ........................................................................................................................................................................... 131
Initialize Port(s) ...................................................................................................................................................................... 131
Reauthenticate Port(s) ........................................................................................................................................................... 132
SSL Settings ............................................................................................................................................................. 133
Download Certificate .............................................................................................................................................................. 134
Ciphersuite ............................................................................................................................................................................. 134
SSH ........................................................................................................................................................................... 135
SSH Settings .......................................................................................................................................................................... 136
SSH Authmode and Algorithm Settings ................................................................................................................................. 136
SSH User Authentication Lists ............................................................................................................................................... 138
Access Authentication Control .................................................................................................................................. 139
Authentication Policy Settings ................................................................................................................................................ 140
Application Authentication Settings ........................................................................................................................................ 140
Authentication Server Group .................................................................................................................................................. 141
Authentication Server ............................................................................................................................................................. 142
Login Method Lists ................................................................................................................................................................. 143
Enable Method Lists .............................................................................................................................................................. 144
Local Enable Password Settings ............................................................................................................................................ 145
MAC-based Access Control ...................................................................................................................................... 146
MAC-based Access Control Settings ..................................................................................................................................... 146