User`s manual

DWS-1008 User’s Manual
D-Link Systems, Inc.
III
Conguring and Managing IGMP Snooping
Disabling or Reenabling IGMP Snooping
Disabling or Reenabling Proxy Reporting
Enabling the Pseudo-Querier
Changing IGMP Timers
Enabling Router Solicitation
Conguring Static Multicast Ports
Displaying Multicast Information
Conguring and Managing Security ACLs
About Security Access Control Lists
Creating and Committing a Security ACL
Mapping Security ACLs
Modifying a Security ACL
Using ACLs to Change CoS
Enabling Prioritization for Legacy Voice over IP
Security ACL Conguration Scenario
Managing Keys and Certicates
Why Use Keys and Certicates?
About Keys and Certicates
Creating Keys and Certicates
Displaying Certicate and Key Information
Key and Certicate Conguration Scenarios
Conguring AAA for Network Users
About AAA for Network Users
AAA Tools for Network Users
Conguring 802.1X Authentication
Conguring Authentication and Authorization by MAC Address
Conguring Last-Resort Access
Conguring AAA for Users of Third-Party APs
Assigning Authorization Attributes
Overriding or Adding Attributes Locally with a Location Policy
Conguring Accounting for Wireless Network Users
Displaying the AAA Conguration
Avoiding AAA Problems in Conguration Order
Conguring a Mobility Prole
Network User Conguration Scenarios
Conguring Communication with RADIUS
RADIUS Overview
Before You Begin
Conguring RADIUS Servers
Conguring RADIUS Server Groups
RADIUS and Server Group Conguration Scenario
225
225
225
225
226
227
228
228
232
232
234
242
245
249
251
253
255
255
256
259
263
264
270
270
275
280
285
289
290
294
303
306
309
310
312
313
320
320
320
320
323
326