D-Link DSA-3100 Wireless Service Gateway DSA-3100/E Leaflet
Product codes
DSA-3100/E
DSA-3100
Wireless Service Gateway
Wireless Service Gateway
Key Features
The DSA-3100 Wireless Service Gateway is a Network Access Control System (NACS) that manages intelligent AAA
(authentication, authorization and accounting) for all wire
(authentication, authorization and accounting) for all wire
d and wireless network users. This security device coordinates ISO
Layer 2, 3, 4 operations to provide your network with comprehensive functions, including IP plug and play, station isolation,
traffic management and accounting, and network policy enforcement.
traffic management and accounting, and network policy enforcement.
Network Access Security
AAA Function Execution
The DSA-3100 Wireless Service Gateway provides you
with
a comfortable and secure way to give entrusted computers
access to your LAN/WAN. The system guarantees that only
registered users are able to use network resources.
access to your LAN/WAN. The system guarantees that only
registered users are able to use network resources.
The DSA-3100
carries out authentication, authorization and
accounting (AAA), three basic issues that
are encountered
frequently in many network services.
Examples of these
services are dial in access to
the Internet, electronic commerce,
Internet printing, and Mobile IP.
Authentication acts to verify
an
d identity so authorization can be granted to access a
resource. Accounting collects resource consumption data for
the purposes of trend analysis, and
the purposes of trend analysis, and
capacity planning, billing,
auditing, and cost allocation.
Can Be Used on Commercial Network
The DSA-3100 can also be installed in a commercial network
providing services to public. Authentication is needed to
make sure that the user of the service is who he claims to be.
This is quite important, because you don't want
providing services to public. Authentication is needed to
make sure that the user of the service is who he claims to be.
This is quite important, because you don't want
someone
else using the service you have paid for. After the user has
been authenticated we need a way to ensure that the user is
authorized to do the things he is requesting. For example, if
you are a normal user you don't have the permissions to
access all the files in a file system. Usually authorization
is provided by using access control lists or policies.
Accounting collects information of the network usage for
billing, capacity planning and other purposes.
been authenticated we need a way to ensure that the user is
authorized to do the things he is requesting. For example, if
you are a normal user you don't have the permissions to
access all the files in a file system. Usually authorization
is provided by using access control lists or policies.
Accounting collects information of the network usage for
billing, capacity planning and other purposes.
3 10/100Mbps Fast Ethernet ports for WAN connection,
trusted LAN connection and untrusted LAN connection
Manages up to 250 user account data with internal user
account database
Supports up to 50 on-line users
ID/Password based authentication and authorization
POP3, RADIUS and LDAP external authentication
mechanism
On-line status monitoring and history traffic data review
trusted LAN connection and untrusted LAN connection
Manages up to 250 user account data with internal user
account database
Supports up to 50 on-line users
ID/Password based authentication and authorization
POP3, RADIUS and LDAP external authentication
mechanism
On-line status monitoring and history traffic data review
SSL protected access to the administration interface and user
authentication interface
Customizable user login, logout web interface
Customizable user logout timer
Customizable target URL
Built-in DHCP server
High-speed policy routing engine
Customizable peremptory traffic redirection
NTP client
authentication interface
Customizable user login, logout web interface
Customizable user logout timer
Customizable target URL
Built-in DHCP server
High-speed policy routing engine
Customizable peremptory traffic redirection
NTP client