D-Link DGS-3100 User Manual page 130

Dgs-3100 series gigabit stackable managed switch
Hide thumbs Also See for DGS-3100:
Table of Contents

Advertisement

Field
Method 2
Method 3
Method 4
2. Define the Method List Name in the Method List Name field.
3. Select the methods used to authenticate network users in the Method 1, Method 2, Method 3 and, Method 4 fields.
4. Click
To edit the Enable Method List, click
fields display the current values, which then can be edited.
To delete an Enable Method List Name, click
updated.
Description
Indicates the second method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Indicates the third method used to authenticate the network user. The possible field values are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Indicates the fourth method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
. The Enable method and passwords are defined, and the device is updated.
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
adjacent to an Enable Method List Name on the list. The upper
. The Enable Method Lists are defined, and the device is
118

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents