D-Link DGS-1210-28P Switch User Manual


 
5 Configuration D-Link Web Smart Switch User Manual
Figure 5.76 – Security > Smart Binding > White List
Select the check box of entry then click Delete to remove it.
Click Select All to select all entries of the table or click Clean to select none entries. Please keep at least
one management host in the White List.
Security > Smart Binding > Black List
The Black List page shows unauthorized accesses. When ARP Inspection is selected and a device sends
out an ARP packet containing unmatched IP-MAC-Port information, the device will be forbidden and listed
here.
Figure 5.77 – Security > Smart Binding > Black List
By giving conditions, desired devices information can be screened out below and then click Find to search
for a list of the entry:
VID: Enter the VLAN ID number of the device.
IP Address: Enter the IP Address of the device.
MAC Address: Enter the MAC Address of the device.
Port: Enter the port number which the device connects to.
Check a box of Delete column to release an entry from the forbidden list and then click Apply to delete an
entry from the list.
Click Select All to select all entries, or click Clean to select none of the entries
AAA > 802.1X > 802.1X Settings
Network switches provide easy and open access to resources, by simply attaching a client PC. Unfortunately
this automatic configuration also allows unauthorized personnel to easily intrude and possibly gain access to
sensitive data.
IEEE-802.1X provides a security standard for network access control, especially in Wi-Fi wireless networks.
802.1X holds a network port disconnected until authentication is completed. The switch uses Extensible
Authentication Protocol over LANs (EAPOL) to exchange authentication protocol client identity (such as a
user name) with the client, and forward it to another remote RADIUS authentication server to verify access
rights. The EAP packet from the RADIUS server also contains the authentication method to be used. The
client can reject the authentication method and request another, depending on the configuration of the client
software and the RADIUS server. Depending on the authenticated results, the port is either made available
to the user, or the user is denied access to the network.
The RADIUS servers make the network a lot easier to manage for the administrator by gathering and storing
the user lists.
5
5
9
9