Login Method Lists - D-Link xStack DGS-3200-10 User Manual

Xstack dgs-3200 series layer 2 managed gigabit ethernet switch
Hide thumbs Also See for xStack DGS-3200-10:
Table of Contents

Advertisement

xStack

Login Method Lists

User-defined or default Login Method List of authentication techniques can be configured for users logging on to the Switch. The
sequence of techniques implemented in this command will affect the authentication result. For example, if a user enters a sequence
of techniques, for example TACACS - XTACACS- local, the Switch will send an authentication request to the first TACACS host
in th e serv er group. If no respo nse co mes fro m th e server ho st, t he Sw itch will send an au thentication requ est t o th e second
TACACS host in the server group and so on, until the list is ex hausted. At that point, the Switch will restart the same seq uence
with the following protoc ol listed, XT ACACS. If no authentication ta kes place using t he XTACACS list, the local account
database set in the Switch is used to authenticate the user. When the local method is used, the privilege level will be dependant on
the local account privilege configured on the Switch.
Successful login using any of these techniques will give the user a "User" privilege only. If the user wishes to upgrade his or her
status to t he ad ministrator lev el, th e u ser must u se th e Enable Admi n window, in which t he user m ust enter a previ ously
configured password, set by the administrator.
To view the following window, click Security > Access Authentication Control > Login Method Lists:
The S witch co ntains o ne M ethod List t hat is set a nd c annot b e removed, y et ca n be modified. To delete a L ogin M ethod Li st
defined by the user, click the Delete button corresponding to the entry desired to be deleted. To modify a Login Method List, click
on its corresponding Edit button.
To define a Login Method List, set the following parameters and click Apply:
Parameter
Method List Name
Priority 1, 2, 3, 4
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
Figure 5 - 41. Login Method Lists window
Description
Enter a method list name defined by the user of up to 15 characters.
The user may add one, or a combination of up to four of the following authentication methods
to this method list:
tacacs - Adding this parameter will require the user to be authenticated using the TACACS
protocol from a remote TACACS server.
xtacacs - Adding this parameter will require the user to be authenticated using the XTACACS
protocol from a remote XTACACS server.
tacacs+ - Adding this parameter will require the user to be authenticated using the TACACS+
protocol from a remote TACACS+ server.
radius - Adding this parameter will require the user to be authenticated using the RADIUS
protocol from a remote RADIUS server.
local - Adding this parameter will require the user to be authenticated using the local user
account database on the Switch.
none - Adding this parameter will require no authentication to access the Switch.
158

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dgs-3200-16Xstack dgs-3200-24

Table of Contents