Home > D-Link > Switch > D-Link Dsh8 Manual

D-Link Dsh8 Manual

Here you can view all the pages of manual D-Link Dsh8 Manual. The D-Link manuals for Switch are available online for free. You can easily download all the documents as PDF.

Page 121

 Chapter 5: Web-Based Management 
GE-DSH-73/DSH-82 and DSH-82-PoE User Manual  117 
X-Ring Configuration 
The Managed Industrial Switch supports th e function and interface for setting the 
switch as the ring master or not. The ri ng master can negotiate and place command 
to other switches in the X-Ring group. If th ere are 2 or more switches in master mode, 
the software will select the switch with  lowest MAC address number as the ring 
master. The X-Ring master ring mode can be enabled by setting...

Page 122

Chapter 5: Web-Based Management 
118  GE-DSH-73/DSH-82 and DSH-82-PoE User Manual 
ports as the member ports. 1st Ring Port is the working port and 2nd 
Ring Port is the backup port. When 1st Ring Port fails, the system will 
automatically upgrade the 2nd Ring Port to be the working port. 
Enable Couple Ring:  To enable the couple ring function, tick the checkbox beside the 
Enable Couple Ring string label. 
Couple Port: Assign the member port which is connected to the 
other ring group. 
Control Port:...

Page 123

 Chapter 5: Web-Based Management 
GE-DSH-73/DSH-82 and DSH-82-PoE User Manual  119 
connected to a switch port before making  available any services offered by the 
switch or the LAN.  
Until the client is authenticated, 802.1X  access control allows only Extensible 
Authentication Protocol over  LAN (EAPOL) traffic through th e port to which the client 
is connected. After authentication is succ essful, normal traffic can pass through the 
port. 
This section includes this conceptual information: 
•...

Page 124

Chapter 5: Web-Based Management 
120  GE-DSH-73/DSH-82 and DSH-82-PoE User Manual 
the client. In this release, the Remote Authentication Dial-In User Service (RADIUS) 
security system with Extensible Authentication Protocol (EAP) extensions is the 
only supported authentication server; it  is available in Cisco Secure Access Control 
Server version 3.0. RADIUS operates in  a client/server model in which secure 
authentication information is exchanged  between the RADIUS server and one or 
more RADIUS...

Page 125

 Chapter 5: Web-Based Management 
GE-DSH-73/DSH-82 and DSH-82-PoE User Manual  121 
authentication succeeds or fails. If the au thentication succeeds, the switch port 
becomes authorized. 
The specific exchange of EAP frames depe nds on the authentication method being 
used. Figure 5-64 shows a message exchange initiated by the client using the One-
Time-Password (OTP) authentication  method with a RADIUS server. 
Figure 5-64:  EAP message exchange 
 
• Ports in Authorized and Unauthorized States 
The...

Page 126

Chapter 5: Web-Based Management 
122  GE-DSH-73/DSH-82 and DSH-82-PoE User Manual 
In contrast, when an 802.1X-enabled client connects to a port that is not running the 
802.1X protocol, the client initiates the au thentication process by sending the EAPOL-
start frame. When no response is received, the client sends the request for a fixed 
number of times. Because no response is re ceived, the client begins sending frames 
as if the port is in the authorized state  
If the client is successfully...

Page 127

 Chapter 5: Web-Based Management 
GE-DSH-73/DSH-82 and DSH-82-PoE User Manual  123 
This page includes the following fields: 
 
Object Description 
IEEE 802.1x Protocol:  Enable or disable 802.1x protocol. 
Radius Server IP:  Assign the RADIUS Server IP address. 
Server Port:  Set the UDP destination port for authentication requests to the 
specified RADIUS Server. 
Accounting Port: Set the UDP destination port for accounting requests to the 
specified RADIUS Server. 
Shared Key: Set an encryption key...

Page 128

Chapter 5: Web-Based Management 
124  GE-DSH-73/DSH-82 and DSH-82-PoE User Manual 
This page includes the following fields: 
 
Object Description 
Reject:  The specified port is required to be held in the unauthorized state. 
Accept:  The specified port is required to be held in the authorized state. 
Authorize: The specified port is set to the Authorized or Unauthorized state in 
accordance with the outcome of
 an authentication exchange 
between the Supplicant and the authentication server. 
Disable:...

Page 129

 Chapter 5: Web-Based Management 
GE-DSH-73/DSH-82 and DSH-82-PoE User Manual  125 
This page includes the following fields: 
 
Object Description 
Quiet Period:  Set the period, which the port doesn’t try to acquire a supplicant. 
TX Period:  Set the period the port waits for retransmit next EAPOL PDU during 
an authentication session. 
Supplicant Timeout: Set the period of time the switch waits for a supplicant response to 
an EAP request. 
Server Timeout: Set the period of time the switch waits for a...

Page 130

Chapter 5: Web-Based Management 
126  GE-DSH-73/DSH-82 and DSH-82-PoE User Manual 
Figure 5-68:  Static MAC Addresses interface 
 
This page includes the following fields: 
 
Object Description 
MAC Address: Enter the MAC address of the port that should permanently forward 
traffic, regardless of the device network activity. 
Port No.:  Pull down the selection menu to select the port number. 
  
Start reading D-Link Dsh8 Manual

Related Manuals for D-Link Dsh8 Manual

All D-Link manuals