D-Link DGS-3100 User Manual page 128

Dgs-3100 series gigabit stackable managed switch
Hide thumbs Also See for DGS-3100:
Table of Contents

Advertisement

Field
Method 3
Method 4
2. Define the Method List Name in the Method List Name field.
3. Select the methods used to authenticate network users in the Method 1, Method 2, Method 3 and, Method 4 fields.
4. Click
To edit the Method List, click
current values, which then can be edited.
To delete a Method List Name, click
Description
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Indicates the third method used to authenticate the network user. The possible field values are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Indicates the fourth method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
. The Login methods are defined, and the device is updated.
adjacent to a Method List Name on the list. The upper fields display the
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
. The Login Method Lists are defined, and the device is updated.
116

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents