4 Configuration
DGS-1210 series Metro Ethernet Managed Switch User Manual
110
Security > SSH Settings > SSH User Authentication Lists
The SSH User Authentication Lists page is used to configure parameters for users attempting to access the
Switch through SSH.
Figure 4.166 – Security > SSH Settings > SSH User Authentication Lists
The user may view the following parameters:
User Name:
A name of no more than
15
characters to identify the SSH user. This User Name must be a
previously configured user account on the Switch.
Auth. Mode:
The administrator may choose one of the following to set the authorization for users attempting
to access the Switch.
Host Based –
This parameter should be chosen if the administrator wishes to use a remote SSH
server for authentication purposes.
Password –
This parameter should be chosen if the administrator wishes to use an administrator-
defined password for authentication. Upon entry of this parameter, the Switch will prompt the
administrator for a password, and then to re-type the password for confirmation.
Public Key –
This parameter should be chosen if the administrator wishes to use the public key on
an SSH server for authentication.
Host Name:
Enter an alphanumeric string of no more than
32
characters to identify the remote SSH user.
This parameter is only used in conjunction with the
Host Based
choice in the Auth. Mode field.
Host IP:
Enter the corresponding IP address of the SSH user. This parameter is only used in conjunction
with the
Host Based
choice in the Auth. Mode field.
MAC-based Access Control (MAC)
MAC-based Access Control is a method to authenticate and authorize access using either a port or host. For
port-based MAC, the method decides port access rights, while for host-based MAC, the method determines
the MAC access rights.
A MAC user must be authenticated before being granted access to a network. Both local authentication and
remote RADIUS server authentication methods are supported. In M AC-based Access Control, M AC user
information in a local database or a RADIUS server data base is searched for authentication. Following the
authentication result, users achieve different levels of Authorization
.
Notes about MAC-based Access Control
There are certain limitations and regulations regarding MAC-based Access Control:
1. Once this feature is enabled for a port, the Switch will clear the FDB of that port.
2. If a port is granted clearance for a MAC address in a VLAN that is not a Guest VLAN, other MAC
addresses on that port must be authenticated for access and otherwise will be blocked by the Switch.
3. A port accepts a maximum of two hundred authenticated MAC addresses per physical port of a VLAN that
is not a Guest VLAN. Other MAC addresses attempting authentication on a port with the maximum number
of authenticated MAC addresses will be blocked.
4. Ports that have been enabled for Link Aggregation, Port Security, or GVRP authentication cannot be
enabled for MAC-based Authentication.
Security > MAC-based Access Control (MAC) > MAC-based Access Control Settings
The MAC-based Access Control Settings page is used to configure the MAC Settings for the MA C-based
Access Control function on the Switch. The user can set the running state, method of authentication, RA
DIUS password, view the Guest VLAN configuration to be associated with the MAC-based Access Control
function of the Switch, and configure ports to be enabled or disabled for the MAC-based Access Control
feature of the Switch. Please rem ember, ports enabled for certain other features, listed previously, cannot
be enabled for MAC-based Access Control.
Summary of Contents for DGS-1210 Series
Page 159: ...140 ...