D-Link DGS-3100 user manual Defining Login Methods, 19. Login Method Lists Page, Description

Models: DGS-3100

1 209
Download 209 pages 46.85 Kb
Page 127
Image 127
Defining Login Methods

DGS-3100 Series Gigabit Stackable Managed Switch User Manual

3. Click Figure 5-19. Login Method Lists Page.The Authentication Host properties are defined, and the device is updated.

To edit an authentication, click Field adjacent to the relevant IP Address on the list. The upper fields display the current values, which then can be edited.

To delete an authentication, click Manual background adjacent to the relevant IP Address on the list. The Authentication Server settings are defined, and the device is updated.

Defining Login Methods

Network users must first login to the device on the Login Method Lists Page. Access as non-administrative users is granted. To configure the device as a Network Administrator, the user must also log on to the device on the Enable Method Lists Page.

User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected authentication method is RADIUS, Local, and the RADIUS server is not available, the user is authenticated locally. To define the user only login method:

1.Click Security > Access Authentication Control > Login Method Lists. The Login Method Lists Page opens:

Figure 5-19. Login Method Lists Page

The Login Method Lists Page contains the following fields:

Field

Method List Name

Method 1

Method 2

Description

Displays the method list name. The field is user-defined besides the http_method_list and https_method_list which cannot be deleted or renamed.

Indicates the first method used to authenticate the network user. The possible field values are: RADIUS — User authentication occurs at the RADIUS server.

TACACS+ — The user authentication occurs at the TACACS+ server. None — No user authentication occurs.

Local — User authentication occurs at the device level. The device checks the user name and password for authentication.

Indicates the second method used to authenticate the network user. The possible field values

115

Page 127
Image 127
D-Link DGS-3100 Defining Login Methods, 19. Login Method Lists Page, Field Method List Name Method Method, Description