DGS-3024 Gigabit Ethernet Switch Manual

authentication is made, the second server host in the list will be queried, and so on. The built-in Authentication Server Groups can only have hosts that are running the specified protocol. For example, the TACACS Authentication Server Groups can only have TACACS Authentication Server Hosts.

The administrator for the Switch may set up six different authentication techniques per user-defined method list (TACACS / XTACACS / TACACS+ / RADIUS / local / none) for authentication. These techniques will be listed in an order preferable, and defined by the user for normal user authentication on the Switch, and may contain up to eight authentication techniques. When a user attempts to access the Switch, the Switch will select the first technique listed for authentication. If the first technique goes through its Authentication Server Hosts and no authentication is returned, the Switch will then go to the next technique listed in the server group for authentication, until the authentication has been verified or denied, or the list is exhausted.

Please note that users granted access to the Switch will be granted normal user privileges on the Switch. To gain access to administrator level privileges, the user must access the Enable Admin window and then enter a password, which was previously configured by the administrator of the Switch.

NOTE: TACACS, XTACACS and TACACS+ are separate entities and are not compatible. The Switch and the server must be configured exactly the same, using the same protocol. (For example, if the Switch is set up for TACACS authentication, so must be the host server.)

Authentication Policy & Parameters

This feature will enable an administrator-defined authentication policy for users trying to access the Switch. When enabled, the device will check the Login Method List and choose a technique for user authentication upon login.

To access the following window, click Security > Access Authentication Control > Policy and Parameters:

 

Figure 8- 8. Policy & Parameter Settings window

The following parameters can be set:

 

 

 

Parameters

Description

 

 

 

Authentication Policy

Use the pull-down menu to enable or disable the Authentication Policy on the

 

 

Switch.

 

 

 

 

Response Timeout (0-

This field will set the time the Switch will wait for a response of authentication from

 

255)

the user. The user may set a time between 0 and 255 seconds. The default setting

 

 

is 30 seconds.

 

 

 

 

User Attempts (1-255)

This command will configure the maximum number of times the Switch will accept

 

 

authentication attempts. Users failing to be authenticated after the set amount of

 

 

attempts will be denied access to the Switch and will be locked out of further

 

 

authentication attempts. Command line interface users will have to wait 60

 

 

seconds before another authentication attempt. Telnet and web users will be

 

 

disconnected from the Switch. The user may set the number of attempts from 1 to

 

 

255. The default setting is 3.

 

 

 

 

95

Page 109
Image 109
D-Link DSL-G604T Authentication Policy & Parameters, Parameters Description Authentication Policy, Response Timeout, 255