
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
143
MAC Based Access Control Local MAC Settings
The following window is used to set a list of MAC addresses, along with their corresponding target VLAN, which will be
authenticated for the Switch. Once a queried MAC address is matched in this window, it will be placed in the VLAN associated
with it here. The switch administrator may enter up to 1024 MAC addresses to be authenticated using the local method configured
here.
To view this window, go to the
Security
folder, open
MAC-Based Access Control
, and click the
MAC-Based Access Control
Local Database Settings
link.
Figure 9- 32. MAC Based Access Control Local MAC Settings window
To add a MAC address to the local authentication list, enter the MAC address and the target VLAN Name into their appropriate
fields and click
Apply
. To change a MAC address or a VLAN in the list, enter its parameters into the appropriate fields and click
Edit
. To delete a MAC address entry, enter its parameters into the appropriate fields and click
Delete By MAC
. To delete a
VLAN Name, enter its parameters into the appropriate fields and click
Delete By VLAN
. To search for a specific MAC Address,
enter the MAC address in the first field and then click the
Find By MAC
button. To search for a specific VLAN Name, enter the
VLAN name in the second field and then click the
Find By VLAN
button.
Web Authentication (Web-based Access Control)
Web Authentication, also known as Web-based Access Control, is another port based access control method implemented
similarily to the 802.1x port based access control method previously stated. This function will allow user authentication through a
RADIUS server or through the local authentication set on the Switch when a user is trying to access the network via the switch, if
the port connected to the user is enabled for this feature.
The user attempting to gain web access will be prompted for a username and password before being allowed to accept HTTP
packets from the Switch. When a client attempts to access a website, that port is placed in the authentication VLAN set by the user.
All clients in this authentication VLAN will be queried for authentication by the local method or through a RADIUS server. Once
accepted, the user will be placed in a target VLAN on the Switch where it will have rights and privileges to openly access the
Internet. If denied access, no packets will pass through to the user and thus, that user will be returned to the authentication VLAN
from where it came and the authentication procedure will have to be reattempted by the user.
Once a client has been authenticated on a particular port, that port will be placed in the pre-configured VLAN and any other
clients on that port will be automatically authenticated to access the specified Redirection Path URL, as well as the authenticated
client.
The following diagram illustrates the basic six steps all parties go through in a successful Web Authentication process: