DGS-3700-12/DGS-3700-12G Series Layer 2 Gigabit Ethernet Switch User Manual

Authentication Policy Settings

This command will enable an administrator-defined authentication policy for users trying to access the Switch. When enabled, the device will check the Login Method List and choose a technique for user authentication upon login.

To view this window, click Security > Access Authentication Control > Authentication Policy Settings as shown below:

Figure 5 - 35 Authentication Policy Settings window

The following parameters can be set:

ParametersDescription

Authentication Policy

Use the pull-down menu to enable or disable the Authentication Policy on the Switch.

 

 

Response Timeout (0-255)

This field will set the time the Switch will wait for a response of authentication from the

 

user. The user may set a time between 0 and 255 seconds. The default setting is 30

 

seconds.

 

 

User Attempts (1-255)

This command will configure the maximum number of times the Switch will accept

 

authentication attempts. Users failing to be authenticated after the set amount of

 

attempts will be denied access to the Switch and will be locked out of further

 

authentication attempts. Command line interface users will have to wait 60 seconds

 

before another authentication attempt. Telnet and web users will be disconnected from

 

the Switch. The user may set the number of attempts from 1 to 255. The default setting

 

is 3.

 

 

Click Apply to implement changes made.

Application Authentication Settings

This window is used to configure switch configuration applications (console, Telnet, SSH, web) for login at the user level and at the administration level (Enable Admin) utilizing a previously configured method list.

To view this window, click Security > Access Authentication Control > Application Authentication Settings as shown below:

Figure 5 - 36 Application's Authentication Settings window

The following parameters can be set:

ParameterDescription

Application

Lists the configuration applications on the Switch. The user may configure the Login Method

 

List and Enable Method List for authentication for users utilizing the Console (Command Line

 

Interface) application, the Telnet application, SSH, and the WEB (HTTP) application.

 

 

Login Method List

Using the pull-down menu, configure an application for normal login on the user level, utilizing

 

 

 

173

Page 184
Image 184
D-Link DGS-3700 user manual Authentication Policy Settings, Application Authentication Settings