User`s manual
DWS-1008 User’s Manual
D-Link Systems, Inc.
III
Conguring and Managing IGMP Snooping
Disabling or Reenabling IGMP Snooping
Disabling or Reenabling Proxy Reporting
Enabling the Pseudo-Querier
Changing IGMP Timers
Enabling Router Solicitation
Conguring Static Multicast Ports
Displaying Multicast Information
Conguring and Managing Security ACLs
About Security Access Control Lists
Creating and Committing a Security ACL
Mapping Security ACLs
Modifying a Security ACL
Using ACLs to Change CoS
Enabling Prioritization for Legacy Voice over IP
Security ACL Conguration Scenario
Managing Keys and Certicates
Why Use Keys and Certicates?
About Keys and Certicates
Creating Keys and Certicates
Displaying Certicate and Key Information
Key and Certicate Conguration Scenarios
Conguring AAA for Network Users
About AAA for Network Users
AAA Tools for Network Users
Conguring 802.1X Authentication
Conguring Authentication and Authorization by MAC Address
Conguring Last-Resort Access
Conguring AAA for Users of Third-Party APs
Assigning Authorization Attributes
Overriding or Adding Attributes Locally with a Location Policy
Conguring Accounting for Wireless Network Users
Displaying the AAA Conguration
Avoiding AAA Problems in Conguration Order
Conguring a Mobility Prole
Network User Conguration Scenarios
Conguring Communication with RADIUS
RADIUS Overview
Before You Begin
Conguring RADIUS Servers
Conguring RADIUS Server Groups
RADIUS and Server Group Conguration Scenario
225
225
225
225
226
227
228
228
232
232
234
242
245
249
251
253
255
255
256
259
263
264
270
270
275
280
285
289
290
294
303
306
309
310
312
313
320
320
320
320
323
326