Configuring Management Access - NETGEAR GS108T-200NAS Software Administration Manual

Smart switch
Table of Contents

Advertisement

GS108T and GS110TP Smart Switch Software Administration Manual
RADIUS: The user's ID and password will be authenticated using the RADIUS server. If
you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch uses Method 2 to authenticate the user.
TACACS+: The user's ID and password will be authenticated using the TACACS+ server.
If you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch attempts user authentication Method 2.
None: The authentication method is unspecified. This option is only available for Method
2 and Method 3.
3. Use the menu in the 2 column to select the authentication method, if any, that should appear
second in the selected authentication login list. This is the method that will be used if the first
method times out. If you select a method that does not time out as the second method, the third
method will not be tried. This parameter will not appear when you first create a new login list.
4. Use the menu in the 3 column to select the authentication method, if any, that should appear
third in the selected authentication login list. This parameter will not appear when you first
create a new login list.
5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
6. If you make changes to the page, click Apply to apply the changes to the system.

Configuring Management Access

From the Access page, you can configure HTTP and Secure HTTP access to the GS108T or
GS110TP management interface. You can also configure Access Control Profiles and Access
Rules.
The Security  Access tab contains the following folders:
"HTTP Configuration" on page 5-15
"Secure HTTP Configuration" on page 5-16
"Certificate Download" on page 5-18
"Access Profile Configuration" on page 5-19
"Access Rule Configuration" on page 5-21
5-14
v1.0, April 2010
Managing Device Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents