Mac-Based Access Control Authentication State; Web-Based Access Control (Wac) - D-Link DGS-3620-28PC-SI Product Manual

Product manual
Table of Contents

Advertisement

xStack® DGS-3620 Series Managed Switch Web UI Reference Guide
Click the Delete by MAC button to remove the specific entry based on the MAC address entered.
Click the Delete by VLAN button to remove the specific entry based on the VLAN name or ID entered.
Click the Find by MAC button to locate a specific entry based on the MAC address entered.
Click the Find by VLAN button to locate a specific entry based on the VLAN name or ID entered.
Click the View All button to display all the existing entries.
Click the Edit by Name button to change the specific MAC address' VLAN name.
Click the Edit by ID button to change the specific MAC address' VLAN ID.
Enter a page number and click the Go button to navigate to a specific page when multiple pages exist.

MAC-based Access Control Authentication State

This window displays MAC-based access control Authentication State information.
To view this window, click Security > MAC-based Access Control (MAC) > MAC-based Access Control
Authentication State as shown below:
The fields that can be configured are described below:
Parameter
Port List
Click the Find button to locate a specific entry based on the information entered.
Click the Clear by Port button to clear all the information linked to the port number entered.
Click the View All Hosts button to display all the existing hosts.
Click the Clear All hosts button to clear out all the existing hosts.

Web-based Access Control (WAC)

Web-based Authentication Login is a feature designed to authenticate a user when the user is trying to access the
Internet via the Switch. The authentication process uses the HTTP or HTTPS protocol. The Switch enters the
authenticating stage when users attempt to browse Web pages (e.g., http://www.dlink.com) through a Web browser.
When the Switch detects HTTP or HTTPS packets and this port is un-authenticated, the Switch will launch a pop-
up user name and password window to query users. Users are not able to access the Internet until the
authentication process is passed.
The Switch can be the authentication server itself and do the authentication based on a local database, or be a
RADIUS client and perform the authentication process via the RADIUS protocol with a remote RADIUS server. The
client user initiates the authentication process of WAC by attempting to gain Web access.
D-Link's implementation of WAC uses a virtual IP that is exclusively used by the WAC function and is not known by
any other modules of the Switch. In fact, to avoid affecting a Switch's other features, WAC will only use a virtual IP
address to communicate with hosts. Thus, all authentication requests must be sent to a virtual IP address but not to
the IP address of the Switch's physical interface.
Virtual IP works like this, when a host PC communicates with the WAC Switch through a virtual IP, the virtual IP is
transformed into the physical IPIF (IP interface) address of the Switch to make the communication possible. The
Figure 8-36 MAC-based Access Control Authentication State window
Description
Enter a list of ports.
345

Advertisement

Table of Contents
loading

Table of Contents