DGS-3024 Gigabit Ethernet Switch Manual

 

 

 

 

IP Address

The IP address of the remote server host the user wishes to add.

 

 

 

 

Protocol

The protocol used by the server host. The user may choose one of the following:

 

 

TACACS - Enter this parameter if the server host utilizes the TACACS protocol.

 

 

XTACACS - Enter this parameter if the server host utilizes the XTACACS protocol.

 

 

TACACS+ - Enter this parameter if the server host utilizes the TACACS+ protocol.

 

 

RADIUS - Enter this parameter if the server host utilizes the RADIUS protocol.

 

 

 

 

Port (1-65535)

Enter a number between 1 and 65535 to define the virtual port number of the

 

 

authentication protocol on a server host. The default port number is 49 for

 

 

TACACS/XTACACS/TACACS+ servers and 1813 for RADIUS servers but the user

 

 

may set a unique port number for higher security.

 

 

 

 

Timeout (1-255)

Enter the time in seconds the Switch will wait for the server host to reply to an

 

 

authentication request. The default value is 5 seconds.

 

 

 

 

Retransmit (1-255)

Enter the value in the retransmit field to change how many times the device will resend

 

 

an authentication request when the TACACS server does not respond.

 

 

 

 

Key

Authentication key to be shared with a configured TACACS+ or RADIUS servers only.

 

 

Specify an alphanumeric string up to 254 characters.

 

 

 

 

Click Apply to add the server host.

 

 

NOTE: More than one authentication protocol can be run on the same

 

 

physical server host but, remember that TACACS/XTACACS/TACACS+

 

 

are separate entities and are not compatible with each other

Login Method Lists

This command will configure a user-defined or default Login Method List of authentication techniques for users logging on to the Switch. The sequence of techniques implemented in this command will affect the authentication result. For example, if a user enters a sequence of techniques, for example TACACS - XTACACS- local, the Switch will send an authentication request to the first TACACS host in the server group. If no response comes from the server host, the Switch will send an authentication request to the second TACACS host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed, XTACACS. If no authentication takes place using the XTACACS list, the local account database set in the Switch is used to authenticate the user. When the local method is used, the privilege level will be dependant on the local account privilege configured on the Switch.

Successful login using any of these techniques will give the user a "User" privilege only. If the user wishes to upgrade his or her status to the administrator level, the user must use the Enable Admin window, in which the user must enter a previously configured password, set by the administrator. (See the Enable Admin part of this section for more detailed information concerning the Enable Admin command.)

To view the following screen click Security > Access Authentication Control > Login Method Lists:

99

Page 113
Image 113
D-Link DSL-G604T manual Login Method Lists, Protocol, Timeout, Retransmit, Key