User Manual
Table Of Contents
- Table of Contents
- About This Guide
- 1 Product Introduction
- 2 Hardware Installation
- 3 Getting Started
- 4 SmartConsole Utility
- 5 Configuration
- Smart Wizard Configuration
- Web-based Management
- Tool Bar > Save Menu
- Tool Bar > Tool Menu
- Tool Bar > Smart Wizard
- Tool Bar > Online Help
- Function Tree
- Device Information
- System > System Settings
- System > DHCP Auto Configuration
- System > Trap Settings (For SmartConsole)
- System > Port Settings
- System > SNMP Settings > SNMP Global State
- System > SNMP Settings > User/Group Table
- System > SNMP Settings > SNMP Group Access Table
- System > SNMP Settings > SNMP View Table
- System > SNMP Settings > Community Table
- System > SNMP Settings > Host Table
- System > SNMP Settings > SNMP Engine ID
- System > SNMP Settings > SNMP Trap Settings
- System > Password Access Control
- System > System Log Settings
- Configuration > Jumbo Frame
- Configuration > 802.1Q VLAN
- Configuration > 802.1Q Management VLAN
- Configuration > Auto Surveillance VLAN > Auto Surveillance VLAN Settings
- Configuration > Voice VLAN > Voice VLAN Settings
- Configuration > Voice VLAN > Voice VLAN OUI Settings
- Configuration > Link Aggregation > Port Trunking
- Configuration > Link Aggregation > LACP Port Settings
- Configuration > IGMP Snooping > IGMP Snooping Configuration
- Configuration > Multicast Filtering Mode
- Configuration > Port Mirroring
- Configuration > Power Saving
- Configuration > Loopback Detection
- Configuration > SNTP Settings > Time Settings
- Configuration > SNTP Settings > TimeZone Settings
- Configuration > Spanning Tree > STP Global Settings
- Configuration > Spanning Tree > STP Port Settings
- QoS > Storm Control
- QoS > Bandwidth Control
- QoS > 802.1p/DSCP Priority Settings
- Security > Trusted Host
- Security > Safeguard Engine
- Security > ARP Spoofing Prevention
- Security > Port Security
- Security > SSL Settings
- Security > 802.1X > 802.1X Settings
- Security > MAC Address Table > Static MAC
- Security > MAC Address Table > Dynamic Forwarding Table
- Security > DHCP Server Screening > DHCP Server Screening Port Setting
- Monitoring > Statistics
- Monitoring > Cable Diagnostics
- Monitoring > System Log
- ACL > ACL Configuration Wizard
- ACL > ACL Profile List
- ACL > ACL Finder
- PoE > PoE Port Settings (DGS-1210-10P only)
- PoE > PoE System Settings (DGS-1210-10P only)
- Time-Based PoE > Time Range Settings (DGS-1210-10P only)
- LLDP > LLDP Global Settings (DGS-1210-10P only)
- LLDP > LLDP Remote Port Information (DGS-1210-10P only)
- LLDP > LLDP MED Settings (DGS-1210-10P only)
- 6 Command Line Interface
- Appendix A - Ethernet Technology
- Appendix B - Technical Specifications
- Appendix C – Rack mount Instructions
- _
5 Configuration D-Link Web Smart Switch User Manual
5
5
3
3
security functions are implemented by Ciphersuite, a security string that determines the cryptographic
parameters, encryption algorithms and key sizes.
This page allows you to configure the SSL global state and the Ciphersuite settings. Select Enable or
Disable and then click Apply to change the SSL state or the Ciphersuite settings of the Switch. By default,
SSL is Disabled and all Ciphersuites are Enabled.
Figure 90 – Security > SSL Settings
NOTE: When SSL is enabled, it will take longer
time to open a web page due to encryption. After
saving configuration, please wait around 10
seconds for the system summery page.
Security > 802.1X > 802.1X Settings
Network switches provide easy and open access to resources, by simply attaching a client PC. Unfortunately
this automatic configuration also allows unauthorized personnel to easily intrude and possibly gain access to
sensitive data.
IEEE-802.1X provides a security standard for network access control, especially in Wi-Fi wireless networks.
802.1X holds a network port disconnected until authentication is completed. The switch uses Extensible
Authentication Protocol over LANs (EAPOL) to exchange authentication protocol client identity (such as a
user name) with the client, and forward it to another remote RADIUS authentication server to verify access
rights. The EAP packet from the RADIUS server also contains the authentication method to be used. The
client can reject the authentication method and request another, depending on the configuration of the client
software and the RADIUS server. Depending on the authenticated results, the port is either made available
to the user, or the user is denied access to the network.
The RADIUS servers make the network a lot easier to manage for the administrator by gathering and storing
the user lists.