The Advantages of QoS ..............................................................................................................................................................................150
Understanding QoS................................................................................................................................................................................151
Bandwidth Control......................................................................................................................................................................................152
QoS Scheduling Mechanism .......................................................................................................................................................................153
QoS Output Scheduling ..............................................................................................................................................................................154
Configuring the Combination Queue.....................................................................................................................................................155
802.1p Default Priority ...............................................................................................................................................................................156
802.1p User Priority....................................................................................................................................................................................157
ACL (Access Control List) ..........................................................................................................................158
Time Range................................................................................................................................................................................ 158
Access Profile Table .................................................................................................................................................................. 159
CPU Interface Filtering .............................................................................................................................................................. 170
CPU Interface Filtering State Settings ........................................................................................................................................................170
CPU Interface Filtering Table.....................................................................................................................................................................170
Security .........................................................................................................................................................181
Traffic Control ........................................................................................................................................................................... 181
Port Security............................................................................................................................................................................... 184
Port Security Entries ...................................................................................................................................................................................185
802.1X........................................................................................................................................................................................ 186
Guest VLANs..............................................................................................................................................................................................186
Limitations Using the Guest VLAN ......................................................................................................................................................186
Guest VLAN ...............................................................................................................................................................................................187
Configure 802.1X Authenticator.................................................................................................................................................................188
Configure 802.1x Guest VLAN ..................................................................................................................................................................190
Authentic RADIUS Server..........................................................................................................................................................................191
Trust Host................................................................................................................................................................................... 192
Access Authentication Control................................................................................................................................................... 193
Authentication Policy & Parameters ...........................................................................................................................................................194
Application's Authentication Settings .........................................................................................................................................................194
Authentication Server Group ......................................................................................................................................................................195
Authentication Server Host .........................................................................................................................................................................196
Login Method Lists.....................................................................................................................................................................................198
Enable Method Lists ...................................................................................................................................................................................199
Configure Local Enable Password ..............................................................................................................................................................201
Enable Admin .............................................................................................................................................................................................201
Traffic Segmentation.................................................................................................................................................................. 202
Secure Socket Layer (SSL) ........................................................................................................................................................ 203
Download Certificate ..................................................................................................................................................................................203
SSL Configuration ......................................................................................................................................................................................204
Secure Shell (SSH)..................................................................................................................................................................... 206
SSH Configuration......................................................................................................................................................................................206
SSH Authentication Mode ..........................................................................................................................................................................207
SSH User Authentication Mode..................................................................................................................................................................209
JWAC (Japanese Web-based Access Control)........................................................................................................................... 211
Summary of Contents for xStack DGS-3426P
Page 310: ...D Link D Link D Link D Link 495 744 00 99 http www dlink ru e mail support dlink ru...
Page 316: ...International Offices...
Page 318: ......