User manual

5 Configuration D-Link Web Smart Switch User Manual
To define a management station IP setting, click the Add Host button and type in the IP address and Subnet
mask. Click the Apply button to save your settings. You may permit only single or a range of IP addresses
by different IP mask settings, the format can either be 192.168.1.1/255.255.255.0 or 192.168.0.1/24. Please
see the example below for permitting the IP range
IP Address Subnet Mask Permitted IP
192.168.0.1 255.255.255.0 192.168.0.1~192.168.0.255
172.17.5.215 255.0.0.0 172.0.0.1~172.255.255.255
To delete the IP address, simply click the Delete button. Check the unwanted address, and then click Apply.
Security > Safeguard Engine
D-Link’s Safeguard Engine is a robust and innovative technology that automatically throttles the impact of
packet flooding into the switch's CPU. This function helps protect the Web-Smart Switch from being
interrupted by malicious viruses or worm attacks. This option is enabled by default.
Figure 76 – Security > Safeguard Engine
Security > Port Security
Port Security is a security feature that prevents unauthorized computers (with source MAC addresses)
unknown to the Switch prior to stopping auto-learning processing from gaining access to the network.
A given ports’ (or a range of ports') dynamic MAC address learning can be stopped such that the current
source MAC addresses entered into the MAC address forwarding table can not be changed once the port
lock is enabled. Using the drop-down menu, change Admin State to Enabled, and then click Apply to
confirm the setting.
Figure 77 – Security > Port Security
Security > 802.1X > 802.1X Settings
Network switches provide easy and open access to resources, by simply attaching a client PC. Unfortunately
this automatic configuration also allows unauthorized personnel to easily intrude and possibly gain access to
sensitive data.
IEEE-802.1X provides a security standard for network access control, especially in Wi-Fi wireless networks.
802.1X holds a network port disconnected until authentication is completed. The switch uses Extensible
Authentication Protocol over LANs (EAPOL) to exchange authentication protocol client identity (such as a
user name) with the client, and forward it to another remote RADIUS authentication server to verify access
rights. The EAP packet from the RADIUS server also contains the authentication method to be used. The
client can reject the authentication method and request another, depending on the configuration of the client
46