D-Link DWS-4026 [13/741] Section 7 configuring access control lists 351

D-Link DWS-4026 [13/741] Section 7 configuring access control lists 351
D-Link UnifiedWiredandWirelessAccessSystem
November2011 Page13
DLinkUWSUserManual
Section7:ConfiguringAccessControlLists .................................................................... 351
ConfiguringIPAccessControlLists ............................................................................................................351
IPACLConfiguration ............................................................................................................................352
IPACLRuleConfiguration ....................................................................................................................353
ModifyinganIPbasedRule ..................................................................................................357
AddingaNewRuletoanIPbasedACL.................................................................................358
DeletingaRulefromanIPbasedACL ..................................................................................358
IPACLSummary ...................................................................................................................................358
IPACLRuleSummary...........................................................................................................................359
MACAccessControlLists ...........................................................................................................................359
MACACLConfiguration .......................................................................................................................360
MACACLRuleConfiguration ........................................................................................................361
AddingaNewRul
etoaMACbasedACL ..............................................................................364
RemovingaRuleFromaMACbasedACL.............................................................................364
MACACLSummary ..............................................................................................................................365
MACACLRuleSummary ......................................................................................................................365
ACLInterfaceConfiguration .......................................................................................................................366
AssigninganACLtoanInterface
..................................................................................................367
RemovinganACLfr
omanInterface .............................................................................................367
Section8:ManagingDeviceSecurity ............................................................................. 368
ConfiguringPortSecurity ...........................................................................................................................368
PortSecurityAdministration................................................................................................................369
PortSecurityInterfaceConfiguration ..................................................................................................369
PortSecurityStatic...............................................................................................................................371
PortSecurityDynamic..........................................................................................................................372
PortSecurityViolationStatus ..............................................................................................................373
SSL/SecureHTTPConfiguration .................................................................................................................374
GeneratingCertificates.........................................................................................................375
DownloadingSSLCertificates ...............................................................................................375
SecureShell(SSH)Configuration ...............................................................................................................377
SecureShellConfiguration...................................................................................................................377
DownloadingSSHHostKeys .........................................................................................................378
CaptivePortalConfiguration......................................................................................................................379
CaptivePortalGlobalConfiguration ....................................................................................................379
CPConfiguration ..................................................................................................................................381
ChangingtheCaptivePortalSettings ...........................................................................................382

Содержание

Похожие устройства

Скачать