05.08.2013 Views

Download - D-Link

Download - D-Link

Download - D-Link

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DES-3028 DES-3028P DES-3028G DES-3052 DES-3052P Layer 2 Fast Ethernet Managed Switch<br />

DHCP Snooping Entries ............................................................................................................................................................ 190<br />

MAC Block List......................................................................................................................................................................... 190<br />

SSL ................................................................................................................................................................191<br />

<strong>Download</strong> Certificate ................................................................................................................................................................. 191<br />

Ciphersuite ................................................................................................................................................................................. 191<br />

SSH................................................................................................................................................................194<br />

SSH Server Configuration ......................................................................................................................................................... 194<br />

SSH Authentication Mode and Algorithm Settings ................................................................................................................... 195<br />

SSH User Authentication ........................................................................................................................................................... 197<br />

802.1X............................................................................................................................................................198<br />

802.1X Authenticator Settings ................................................................................................................................................... 205<br />

Local Users ................................................................................................................................................................................ 208<br />

802.1X Capability Settings ........................................................................................................................................................ 209<br />

Configure 802.1X Guest VLAN ................................................................................................................................................ 209<br />

Initializing Ports for Port Based 802.1X .................................................................................................................................... 210<br />

Initializing Ports for Host Based 802.1X ................................................................................................................................... 211<br />

Reauthenticate Port(s) for Port Based 802.1X ........................................................................................................................... 212<br />

Reauthenticate Port(s) for Host-based 802.1X........................................................................................................................... 213<br />

RADIUS Server ......................................................................................................................................................................... 213<br />

Trusted Host.................................................................................................................................................214<br />

Access Authentication Control ...................................................................................................................215<br />

Authentication Policy and Parameter Settings ........................................................................................................................... 216<br />

Application Authentication Settings .......................................................................................................................................... 216<br />

Authentication Server Group ..................................................................................................................................................... 217<br />

Authentication Server Host........................................................................................................................................................ 218<br />

Login Method Lists.................................................................................................................................................................... 221<br />

Enable Method Lists .................................................................................................................................................................. 222<br />

Configure Local Enable Password ............................................................................................................................................. 225<br />

Enable Admin ............................................................................................................................................................................ 225<br />

Traffic Segmentation ...................................................................................................................................226<br />

DoS Attack Prevention ................................................................................................................................227<br />

Monitoring....................................................................................................................................................232<br />

CPU Utilization ............................................................................................................................................232<br />

Port Utilization.............................................................................................................................................233<br />

Packets ..........................................................................................................................................................234<br />

Received (RX) ........................................................................................................................................................................... 235<br />

UMB Cast (RX) ......................................................................................................................................................................... 237<br />

Transmitted (TX) ....................................................................................................................................................................... 239<br />

Packet Errors ...............................................................................................................................................241<br />

Received (RX) ........................................................................................................................................................................... 241<br />

vi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!