DWS-1008 User’s Manual
D-Link Systems, Inc.
III
Configuring and Managing IGMP Snooping
Disabling or Reenabling IGMP Snooping
Disabling or Reenabling Proxy Reporting
Enabling the Pseudo-Querier
Changing IGMP Timers
Enabling Router Solicitation
Configuring Static Multicast Ports
Displaying Multicast Information
Configuring and Managing Security ACLs
About Security Access Control Lists
Creating and Committing a Security ACL
Mapping Security ACLs
Modifying a Security ACL
Using ACLs to Change CoS
Enabling Prioritization for Legacy Voice over IP
Security ACL Configuration Scenario
Managing Keys and Certificates
Why Use Keys and Certificates?
About Keys and Certificates
Creating Keys and Certificates
Displaying Certificate and Key Information
Key and Certificate Configuration Scenarios
Configuring AAA for Network Users
About AAA for Network Users
AAA Tools for Network Users
Configuring 802.1X Authentication
Configuring Authentication and Authorization by MAC Address
Configuring Last-Resort Access
Configuring AAA for Users of Third-Party APs
Assigning Authorization Attributes
Overriding or Adding Attributes Locally with a Location Policy
Configuring Accounting for Wireless Network Users
Displaying the AAA Configuration
Avoiding AAA Problems in Configuration Order
Configuring a Mobility Profile
Network User Configuration Scenarios
Configuring Communication with RADIUS
RADIUS Overview
Before You Begin
Configuring RADIUS Servers
Configuring RADIUS Server Groups
RADIUS and Server Group Configuration Scenario
225
225
225
225
226
227
228
228
232
232
234
242
245
249
251
253
255
255
256
259
263
264
270
270
275
280
285
289
290
294
303
306
309
310
312
313
320
320
320
320
323
326
Summary of Contents for DWS-1008
Page 1: ......