6
© 2001- 2011 D-Link Corporation. All Rights Reserved.
Configuration Guide
Example #8: Show MAC Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
97
Web Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
98
MAC ACL Web Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
98
IP ACL Web Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
101
16 802.1X Network Access Control . . . . . . . . . . . . . . . . . . . . . . . .105
802.1x Network Access Control Example . . . . . . . . . . . . . . . . . . . . . . . . .
106
Guest VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
107
Configuring the Guest VLAN by Using the CLI. . . . . . . . . . . . . . . . . . . . . . .
107
Configuring the Guest VLAN by Using the Web Interface. . . . . . . . . . . . . . .
108
Configuring Dynamic VLAN Assignment . . . . . . . . . . . . . . . . . . . . . . . . .
109
17 Captive Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Web Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
111
CLI Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
113
Customizing the Captive Portal Web Page . . . . . . . . . . . . . . . . . . . . . . . .
113
Client Authentation Logout Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
116
Captive Port Rate Limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
117
18 Port Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
119
Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
119
CLI Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
120
Example #1: show port security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
120
Example #2: show port security on a specific interface . . . . . . . . . . . . . . . .
120
Example #3: (Config) port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
120
Web Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
121
19 RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125
Client Name in Local MAC Authentication List . . . . . . . . . . . . . . . . . . . .
125
RADIUS Fail-through and Failover Server Support . . . . . . . . . . . . . . . .
126
RADIUS Configuration Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
127
Configuring RADIUS for Wired Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
127
Configuring RADIUS Fail-through on a Managed AP . . . . . . . . . . . . . . . . .
131
20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133
Configuration Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
133
Configuring by Using CLI Commands. . . . . . . . . . . . . . . . . . . . .
134
Configuring by Using the Web Interface . . . . . . . . . . . . . . . . . . .
135
21 Class of Service Queuing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
Ingress Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
139
Trusted and Untrusted Ports/CoS Mapping Table . . . . . . . . . . . . . . . . . . . . .
139
CoS Mapping Table for Trusted Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
140
Egress Port Configuration - Traffic Shaping . . . . . . . . . . . . . . . . . . . . . .
140
Queue Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
140
Summary of Contents for UNIFIED WIRED & WIRELESS ACCESS SYSTEM DWS-3000
Page 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Page 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Page 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Page 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Page 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...