
4 Web-based Switch Configuration
D-Link DGS-2000 Series Ethernet Switch User Manual
8
8
9
9
Security > MAC Address Table > Static MAC
Allow user to create static MAC address entry into forwarding table. This feature usually used in the port
connected to certain devices that are permanent used in network, for example: DHCP servers, syslog server,
network gateway location, etc.
Figure 4.123 – Security > MAC Address Table > Static Mac Address
The
Static MAC Address Lists
table displays the static MAC addresses connected, as well as the VID.
Add Static MAC Address:
you need to select the assigned Port number. Enter both the Mac Address and
VID, and then Click
Add
. Click
Delete
to remove one entry or click
Delete all
to clear the list.
Security > MAC Address Table > Dynamic Forwarding Table
For each port, this table displays the MAC address learned by the Switch. To add a MAC address to the
Static Mac Address List, click the
Add
checkbox, and then click
Apply
associated with the identified address.
Figure 4.124 – Security > MAC Address Table > Dynamic Forwarding Table
Security > Access Authentication Control > Authentication Policy Settings
This feature will enable an administrator-defined authentication policy for users trying to access the Switch.
When enabled, the device will check the Login Method List and choose a technique for user authentication
upon login.
Figure 4.125 – Security > Access Authentication control > Authentication Policy Settings
Authentication Policy:
Use the pull-down menu to enable or disable the Authentication Policy on the Switch.
Response Timeout (0 - 255):
This field will set the time the Switch will wait for a response of authentication
from the user. The user may set a time between
0
and
255
seconds. The default setting is
30
seconds.
User attempts (1 - 255):
This command will configure the maximum number of times the Switch will accept
authentication attempts. Users failing to be authenticated after the set amount of attempts will be denied
access to the Switch and will be locked out of further authentication attempts. Command line interface users