Configuring Device Security
Configuring Network Security
Page 99
Configuring Network Security
Network security manages both access control lists and locked ports. This section contains the following topics:
•
Network Security Overview
•
Defining Network Authentication Properties
•
Defining Port Authentication
•
Configuring Traffic Control
Network Security Overview
This section provides an overview of network security and contains the following topics:
•
Port-Based Authentication
•
Advanced Port-Based Authentication
Port-Based Authentication
Port-based authentication authenticates users on a per-port basis via an external server. Only authenticated and
approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the
Extensible Authentication Protocol
(EAP). Port-based authentication includes:
•
Authenticators
— Specifies the device port which is authenticated before permitting system access.
•
Supplicants
— Specifies the host connected to the authenticated port requesting to access the system ser-
vices.
•
Authentication Server
— Specifies the server that performs the authentication on behalf of the authentica-
tor, and indicates whether the supplicant is authorized to access system services.
Port-based authentication creates two access states:
•
Controlled Access
— Permits communication between the supplicant and the system, if the supplicant is
authorized.
•
Uncontrolled Access
— Permits uncontrolled communication regardless of the port state.
The device currently supports port-based authentication via RADIUS servers.
Advanced Port-Based Authentication
Advanced port-based authentication enables multiple hosts to be attached to a single port. Advanced port-based
authentication requires only one host to be authorized for all hosts to have system access. If the port is unautho-
rized, all attached hosts are denied access to the network.
Advanced port-based authentication also enables user-based authentication. Specific VLANs in the device are
always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does
not require authentication, while data traffic requires authentication. VLANs for which authorization is not required
can be defined. Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined
as authorized.
Advanced port-based authentication is implemented in the following modes:
•
Single Host Mode
— Allows port access only to the authorized host.
•
Multiple Host Mode
— Multiple hosts can be attached to a single port. Only one host must be authorized for
all hosts to access the network. If the host authentication fails, or an EAPOL-logoff message is received, all
attached clients are denied access to the network.
•
Guest VLANs
— Provides limited network access to authorized ports. If a port is denied network access via
port-based authorization, but the Guest VLAN is enabled, the port receives limited network access. For exam-
Summary of Contents for DWS-3227 - xStack Switch - Stackable
Page 24: ...Device Description Physical Dimensions Page 23 This page is left blank intentionally ...
Page 25: ...DXS DWS 3200 Series User Guide Page 24 ...
Page 51: ...DXS DWS 3200 Series User Guide Page 50 This page is left blank intentionally ...
Page 65: ...DXS DWS 3200 Series User Guide Page 64 This page is left blank intentionally ...
Page 77: ...DXS DWS 3200 Series User Guide Page 76 This page is left blank intentionally ...
Page 121: ...DXS DWS 3200 Series User Guide Page 120 This page is left blank intentionally ...
Page 171: ...DXS DWS 3200 Series User Guide Page 170 ...
Page 191: ...DXS DWS 3200 Series User Guide Page 190 ...
Page 205: ...DXS DWS 3200 Series User Guide Page 204 This page is left intentionally ...
Page 237: ...DXS DWS 3200 Series User Guide Page 236 This page is left blank intentionally ...
Page 273: ...DXS DWS 3200 Series User Guide Page 272 This page is left blank intentionally ...
Page 295: ...DXS DWS 3200 Series User Guide Page 294 This page is left blank intentionally ...
Page 333: ...DXS DWS 3200 Series User Guide Page 332 This page is left blank intentionally ...
Page 339: ...DXS DWS 3200 Series User Guide Page 338 ...
Page 340: ...Contacting D Link Technical Support Page 339 ...
Page 341: ...DXS DWS 3200 Series User Guide Page 340 ...
Page 342: ...Contacting D Link Technical Support Page 341 ...
Page 343: ...DXS DWS 3200 Series User Guide Page 342 ...
Page 344: ...Contacting D Link Technical Support Page 343 ...
Page 345: ...DXS DWS 3200 Series User Guide Page 344 ...
Page 346: ...Contacting D Link Technical Support Page 345 ...
Page 347: ...DXS DWS 3200 Series User Guide Page 346 ...
Page 348: ...Contacting D Link Technical Support Page 347 ...
Page 349: ...DXS DWS 3200 Series User Guide Page 348 ...
Page 350: ...Contacting D Link Technical Support Page 349 ...
Page 351: ...DXS DWS 3200 Series User Guide Page 350 ...
Page 352: ...Contacting D Link Technical Support Page 351 ...
Page 353: ...DXS DWS 3200 Series User Guide Page 352 ...
Page 354: ...Contacting D Link Technical Support Page 353 ...
Page 355: ...DXS DWS 3200 Series User Guide Page 354 ...
Page 356: ...Contacting D Link Technical Support Page 355 ...
Page 357: ...DXS DWS 3200 Series User Guide Page 356 ...
Page 358: ...Contacting D Link Technical Support Page 357 ...
Page 359: ...DXS DWS 3200 Series User Guide Page 358 ...
Page 360: ...Contacting D Link Technical Support Page 359 ...
Page 361: ...DXS DWS 3200 Series User Guide Page 360 ...
Page 362: ...Contacting D Link Technical Support Page 361 ...
Page 363: ...DXS DWS 3200 Series User Guide Page 362 ...
Page 364: ...Contacting D Link Technical Support Page 363 ...
Page 365: ...DXS DWS 3200 Series User Guide Page 364 ...
Page 369: ...DXS DWS 3200 Series User Guide Page 368 ...