Application Authentication Settings - D-Link Xstack DES-3528 Series Reference Manual

Stackable fast ethernet switch web ui
Hide thumbs Also See for Xstack DES-3528 Series:
Table of Contents

Advertisement

xStack® DES-3528/DES-3552 Series Layer 2 Managed Stackable Fast Ethernet Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter
Authentication Policy
Response Timeout (0-
255)
User Attempts (1-255)
Click the Apply button to accept the changes made.

Application Authentication Settings

Users can configure Switch configuration applications (Console, Telnet, SSH, HTTP) for login at the user level and
at the administration level (Enable Admin) utilizing a previously configured method list.
To view this window, click Security > Access Authentication Control > Application Authentication Settings,
as shown below:
The fields that can be configured are described below:
Parameter
Application
Login Method List
Figure 8-60 Authentication Policy Settings window
Description
Use the pull-down menu to enable or disable the Authentication Policy on the Switch.
This field will set the time the Switch will wait for a response of authentication from the
user. The user may set a time between 0 and 255 seconds. The default setting is 30
seconds.
This command will configure the maximum number of times the Switch will accept
authentication attempts. Users failing to be authenticated after the set amount of
attempts will be denied access to the Switch and will be locked out of further
authentication attempts. Command line interface users will have to wait 60 seconds
before another authentication attempt. Telnet and Web users will be disconnected from
the Switch. The user may set the number of attempts from 1 to 255. The default setting
is 3.
Figure 8-61 Application Authentication Settings window
Description
Lists the configuration applications on the Switch. The user may configure the Login
Method List and Enable Method List for authentication for users utilizing the Console
(Command Line Interface) application, the Telnet application, SSH application, and the
HTTP application.
Using the pull-down menu, configure an application for normal login on the user level,
utilizing a previously configured method list. The user may use the default Method List or
other Method List configured by the user. See the Login Method Lists window, in this
266

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack des-3552 series

Table of Contents