Authentication List Configuration - NETGEAR S3300 User Manual

Smart managed pro
Hide thumbs Also See for S3300:
Table of Contents

Advertisement

Authentication List Configuration

Use the Authentication List screen to configure the default login list. A login list specifies one
or more authentication methods to validate switch or port access for the admin user.
Note:
Admin is the only user on the system and is assigned to a
preconfigured list named defaultList, which you cannot delete.
HTTP Authentication List
Use the HTTP Authentication List to configure the default HTTP login list.
To change the HTTP authentication method for the defaultList:
1.
Select Security > Management Security > Authentication List > HTTP Authentication
List.
2.
Select the check box next to the httpList name.
3.
From the list in the 1 column, select the authentication method that should appear first in the
selected authentication login list.
If you select a method that does not time out as the first method, such as Local, no other
method will be tried, even if you have specified more than one method. User
authentication occurs in the order the methods are selected. Possible methods are as
follows:
Local. The user's locally stored ID and password will be used for authentication.
Since the local method does not time out, if you select this option as the first method,
no other method will be tried, even if you have specified more than one method.
RADIUS. The user's ID and password will be authenticated using the RADIUS server.
If you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch uses Method 2 to authenticate the user.
TACACS+. The user's ID and password will be authenticated using the TACACS+
server. If you select RADIUS or TACACS+ as the first method and an error occurs
during the authentication, the switch attempts user authentication Method 2.
None. The authentication method is unspecified. This option is available only for
Method 2 and Method 3.
4.
From the list in the 2 column, select the authentication method, if any, that should appear
second in the selected authentication login list.
This is the method that is used if the first method times out. If you select a method that
does not time out as the second method, the third method is not tried.
5.
From the list in the 3 column, select the authentication method, if any, that should appear
third in the selected authentication login list.
6.
From the list in the 4 column, select the method, if any, that should appear fourth in the
selected authentication login list.
This is the method that will be used if all previous methods time out.
S3300 Smart Managed Pro Switch
Managing Device Security
249

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents