D-Link DES-1210-10/ME [86/129] Security access authentication control login method lists

D-Link DES-1210-10/ME [86/129] Security access authentication control login method lists
4 Configuration DES-1210 Metro Ethernet Managed Switch User Manual
80
Figure 4.134 Security > Access Authentication control > Authentication Server
To add an Authentication Server Host:
IP Address: Select IPv4 or IPv6 and enter the IP address.
Protocol: The protocol used by the server host. The user may choose one of the following:
TACACS+ Enter this parameter if the server host utilizes the TACACS+ protocol.
RADIUS Enter this parameter if the server host utilizes the RADIUS protocol.
Key: Authentication key to be shared with a configured TACACS+ or RADIUS servers only. Specify an
alphanumeric string up to 254 characters.
Port (1 - 65535): Enter a number between 1 and 65535 to define the virtual port number of the
authentication protocol on a server host. The default port number is 49 for TACACS+ server and 1813 for
RADIUS servers but the user may set a unique port number for higher security.
Timeout (1 - 255): Enter the time in seconds the Switch will wait for the server host to reply to an
authentication request. The default value is 5 seconds.
Retransmit (1 - 255): Enter the value in the retransmit field to change how many times the device will resend
an authentication request when the TACACS server does not respond.
Click Apply to add a new Authentication Server Host.
NOTE: More than one authentication protocol can
be run on the same physical server host.
Security > Access Authentication Control > Login Method Lists
This feature will configure a user-defined or default Login Method List of authentication techniques for users
logging on to the Switch. Successful login using any of these techniques will give the user a "User" privilege
only. To upgrade his or her status to the administrator level, the user must use the Enable Admin window, in
which the user must enter a previously configured password, set by the administrator.
The Switch contains one Method List that is set and cannot be removed, yet can be modified. To delete a
Login Method List defined by the user, click Delete button. To modify the Login Method List, click Edit button.
Figure 4.135 Security > Access Authentication control > Login Method Lists
To define a Login Method List, set the following parameters and click Apply:
Method List Name: Enter a method list name defined by the user of up to 15 characters.
Priority 1, 2, 3, 4: The user may add one, or a combination of up to four of the following authentication
methods to this method list:
none Adding this parameter will require an authentication to access the Switch.
local Adding this parameter will require the user to be authenticated using the local user account
database on the Switch.

Содержание

Похожие устройства