xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
vi
ND Snooping ........................................................................................................................................................... 225
MAC-based Access Control (MAC)............................................................................................................................. 227
MAC-based Access Control Settings ...................................................................................................................... 227
MAC-based Access Control Local Settings ............................................................................................................. 229
MAC-based Access Control Authentication State ................................................................................................... 230
Web-based Access Control (WAC) ............................................................................................................................. 231
WAC Global Settings ............................................................................................................................................... 233
WAC User Settings .................................................................................................................................................. 234
WAC Port Settings ................................................................................................................................................... 235
WAC Authentication State ....................................................................................................................................... 236
Japanese Web-based Access Control (JWAC) .......................................................................................................... 236
JWAC Global Settings ............................................................................................................................................. 236
JWAC Port Settings ................................................................................................................................................. 238
JWAC User Settings ................................................................................................................................................ 240
JWAC Authentication State ..................................................................................................................................... 240
JWAC Customize Page Language .......................................................................................................................... 241
JWAC Customize Page ........................................................................................................................................... 242
Compound Authentication ........................................................................................................................................... 243
Compound Authentication Settings ......................................................................................................................... 244
Compound Authentication Guest VLAN Settings .................................................................................................... 246
Port Security ................................................................................................................................................................ 247
Port Security Settings .............................................................................................................................................. 247
Port Security VLAN Settings .................................................................................................................................... 248
Port Security Entries ................................................................................................................................................ 249
ARP Spoofing Prevention Settings ............................................................................................................................. 249
BPDU Attack Protection .............................................................................................................................................. 250
Loopback Detection Settings ...................................................................................................................................... 252
Traffic Segmentation Settings ..................................................................................................................................... 253
NetBIOS Filtering Settings .......................................................................................................................................... 254
DHCP Server Screening ............................................................................................................................................. 255
DHCP Server Screening Port Settings .................................................................................................................... 255
DHCP Offer Permit Entry Settings........................................................................................................................... 256
Access Authentication Control .................................................................................................................................... 256
Enable Admin .......................................................................................................................................................... 257
Authentication Policy Settings ................................................................................................................................. 258
Application Authentication Settings ......................................................................................................................... 259
Authentication Server Group Settings ..................................................................................................................... 259
Authentication Server Settings ................................................................................................................................ 261
Login Method Lists Settings .................................................................................................................................... 262
Enable Method Lists Settings .................................................................................................................................. 263
Local Enable Password Settings ............................................................................................................................. 264
SSL Settings................................................................................................................................................................ 265
SSH ............................................................................................................................................................................. 267
SSH Settings ........................................................................................................................................................... 267
SSH Authentication Method and Algorithm Settings ............................................................................................... 268
SSH User Authentication List .................................................................................................................................. 270
Trusted Host Settings .................................................................................................................................................. 271