![D-Link DES-3252P - Web Smart Switch Скачать руководство пользователя страница 131](http://html.mh-extra.com/html/d-link/des-3252p-web-smart-switch/des-3252p-web-smart-switch_install-manual_77894131.webp)
Configuring Device Security
Configuring Network Security
Page 131
Configuring Network Security
Network security manages both access control lists and locked ports. This section contains the following topics:
•
Network Security Overview
•
Defining Network Authentication Properties
•
Defining Port Authentication
•
Configuring Traffic Control
Network Security Overview
This section provides an overview of network security and contains the following topics:
•
Port-Based Authentication
•
Advanced Port-Based Authentication
Port-Based Authentication
Port-based authentication authenticates users on a per-port basis via an external server. Only authenticated and
approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the
Extensible Authentication Protocol
(EAP). Port-based authentication includes:
•
Authenticators
— Specifies the device port which is authenticated before permitting system access.
•
Supplicants
— Specifies the host connected to the authenticated port requesting to access the system ser-
vices.
•
Authentication Server
— Specifies the server that performs the authentication on behalf of the authentica-
tor, and indicates whether the supplicant is authorized to access system services.
Port-based authentication creates two access states:
•
Controlled Access
— Permits communication between the supplicant and the system, if the supplicant is
authorized.
•
Uncontrolled Access
— Permits uncontrolled communication regardless of the port state.
The device currently supports port-based authentication via RADIUS servers.
Advanced Port-Based Authentication
Advanced port-based authentication enables multiple hosts to be attached to a single port. Advanced port-based
authentication requires only one host to be authorized for all hosts to have system access. If the port is unautho-
rized, all attached hosts are denied access to the network.
Advanced port-based authentication also enables user-based authentication. Specific VLANs in the device are
always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does
not require authentication, while data traffic requires authentication. VLANs for which authorization is not required
can be defined. Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined
as authorized.
Содержание DES-3252P - Web Smart Switch
Страница 1: ......
Страница 271: ...Appendix C Technical Support Contacting D Link Technical Support Page 271 ...
Страница 272: ...Appendix C Technical Support Contacting D Link Technical Support Page 272 ...
Страница 273: ...Appendix C Technical Support Contacting D Link Technical Support Page 273 ...
Страница 274: ...Appendix C Technical Support Contacting D Link Technical Support Page 274 ...
Страница 275: ...Appendix C Technical Support Contacting D Link Technical Support Page 275 ...
Страница 276: ...Appendix C Technical Support Contacting D Link Technical Support Page 276 ...
Страница 277: ...Appendix C Technical Support Contacting D Link Technical Support Page 277 ...
Страница 278: ...Appendix C Technical Support Contacting D Link Technical Support Page 278 ...
Страница 279: ...Appendix C Technical Support Contacting D Link Technical Support Page 279 ...
Страница 280: ...Appendix C Technical Support Contacting D Link Technical Support Page 280 ...
Страница 281: ...Appendix C Technical Support Contacting D Link Technical Support Page 281 ...
Страница 282: ...Appendix C Technical Support Contacting D Link Technical Support Page 282 ...
Страница 283: ...Appendix C Technical Support Contacting D Link Technical Support Page 283 ...
Страница 284: ...Appendix C Technical Support Contacting D Link Technical Support Page 284 ...
Страница 285: ...Appendix C Technical Support Contacting D Link Technical Support Page 285 ...
Страница 286: ...Appendix C Technical Support Contacting D Link Technical Support Page 286 ...
Страница 287: ...Appendix C Technical Support Contacting D Link Technical Support Page 287 ...
Страница 288: ...Appendix C Technical Support Contacting D Link Technical Support Page 288 ...
Страница 289: ...Appendix C Technical Support Contacting D Link Technical Support Page 289 ...
Страница 290: ...Appendix C Technical Support Contacting D Link Technical Support Page 290 ...
Страница 291: ...Appendix C Technical Support Contacting D Link Technical Support Page 291 ...
Страница 292: ...Appendix C Technical Support Contacting D Link Technical Support Page 292 ...
Страница 293: ...Appendix C Technical Support Contacting D Link Technical Support Page 293 ...
Страница 294: ...Appendix C Technical Support Contacting D Link Technical Support Page 294 ...
Страница 295: ...Appendix C Technical Support Contacting D Link Technical Support Page 295 ...
Страница 296: ...Appendix C Technical Support Contacting D Link Technical Support Page 296 ...