User Manual
Table Of Contents
- Table of Contents
- About This Guide
- 1 Product Introduction
- 2 Hardware Installation
- 3 Getting Started
- 4 SmartConsole Utility
- 5 Configuration
- Smart Wizard Configuration
- Web-based Management
- Tool Bar > Save Menu
- Tool Bar > Tool Menu
- Tool Bar > Smart Wizard
- Tool Bar > Online Help
- Function Tree
- Device Information
- System > System Settings
- System > DHCP Auto Configuration
- System > Trap Settings (For SmartConsole)
- System > Port Settings
- System > SNMP Settings > SNMP Global State
- System > SNMP Settings > User/Group Table
- System > SNMP Settings > SNMP Group Access Table
- System > SNMP Settings > SNMP View Table
- System > SNMP Settings > Community Table
- System > SNMP Settings > Host Table
- System > SNMP Settings > SNMP Engine ID
- System > SNMP Settings > SNMP Trap Settings
- System > Password Access Control
- System > System Log Settings
- Configuration > Jumbo Frame
- Configuration > 802.1Q VLAN
- Configuration > 802.1Q Management VLAN
- Configuration > Auto Surveillance VLAN > Auto Surveillance VLAN Settings
- Configuration > Voice VLAN > Voice VLAN Settings
- Configuration > Voice VLAN > Voice VLAN OUI Settings
- Configuration > Link Aggregation > Port Trunking
- Configuration > Link Aggregation > LACP Port Settings
- Configuration > IGMP Snooping > IGMP Snooping Configuration
- Configuration > Multicast Filtering Mode
- Configuration > Port Mirroring
- Configuration > Power Saving
- Configuration > Loopback Detection
- Configuration > SNTP Settings > Time Settings
- Configuration > SNTP Settings > TimeZone Settings
- Configuration > Spanning Tree > STP Global Settings
- Configuration > Spanning Tree > STP Port Settings
- QoS > Storm Control
- QoS > Bandwidth Control
- QoS > 802.1p/DSCP Priority Settings
- Security > Trusted Host
- Security > Safeguard Engine
- Security > ARP Spoofing Prevention
- Security > Port Security
- Security > SSL Settings
- Security > 802.1X > 802.1X Settings
- Security > MAC Address Table > Static MAC
- Security > MAC Address Table > Dynamic Forwarding Table
- Security > DHCP Server Screening > DHCP Server Screening Port Setting
- Monitoring > Statistics
- Monitoring > Cable Diagnostics
- Monitoring > System Log
- ACL > ACL Configuration Wizard
- ACL > ACL Profile List
- ACL > ACL Finder
- PoE > PoE Port Settings (DGS-1210-10P only)
- PoE > PoE System Settings (DGS-1210-10P only)
- Time-Based PoE > Time Range Settings (DGS-1210-10P only)
- LLDP > LLDP Global Settings (DGS-1210-10P only)
- LLDP > LLDP Remote Port Information (DGS-1210-10P only)
- LLDP > LLDP MED Settings (DGS-1210-10P only)
- 6 Command Line Interface
- Appendix A - Ethernet Technology
- Appendix B - Technical Specifications
- Appendix C – Rack mount Instructions
- _
5 Configuration D-Link Web Smart Switch User Manual
54
Figure 91 – Security > 802.1X > 802.1X Settings
By default, 802.1X is disabled. To use EAP for security, select enabled and set the 802.1X Global Settings
for the Radius Server and applicable authentication information.
RADIUS Server IP: The IP address of the external Radius Server. You need to specify an RADIUS server to
enable 802.1X authentication.
Key: Masked password matching the Radius Server Key. The max. length is 32 characters.
Confirm Key: Enter the Key a second time for confirmation.
TxPeriod (1 – 65535 sec): This sets the TxPeriod of time for the authenticator PAE state machine. This
value determines the period of an EAP Request/Identity packet transmitted to the client. Default is 24
seconds.
ReAuthEnabled: This function is to determine whether regular re-authentication will take place on this
port(s). When the 802.1X function is enabled, the switch sends an EAP-request/identity packet to client. The
ReAuthEnabled function is by default disabled.
QuietPeriod (0 – 65535 sec): Sets the number of seconds that the switch remains in the quiet state
following a failed authentication exchange with the client. Default is 80 seconds
SuppTimeout (1 – 65535 sec): This value determines timeout conditions in the exchanges between the
Authenticator and the client. Default is 12 seconds.
ServerTimeout (1 – 65535 sec): Sets the amount of time the switch waits for a response from the client
before resending the response to the authentication server. Default is 16 seconds.
MaxReq (1 – 10): This parameter specifies the maximum number of times that the switch retransmits an
EAP request (md-5challnege) to the client before it times out the authentication session. Default is 5 times.
ReAuthPeriod (1 – 4294967295 sec): This command affects the behavior of the switch only if periodic re-
authentication is enabled. Default is 3600.
To establish 802.1X port-specific assignments, select the From Ports / To Ports and select Enable.
802.1X Port Access Control: Three type of Port Access Control State can be "Force Authorized", "Force
UnAuthorized", and "Auto".
Select Force Authorized to disable 802.1X and cause the port to transition to the authorized state without
any authentication exchange required. This means the port transmits and receives normal traffic without
802.1X-based authentication of the client.
If Force Unauthorized is selected, the port will remain in the unauthorized state ignoring all attempts by the
client to authenticate. The Switch cannot provide authentication services to the client through the interface.