Application Authentication Settings; Authentication Server Host - D-Link DGS-3048 - Switch Product Manual

Managed 48-port gigabit ethernet switch
Hide thumbs Also See for DGS-3048 - Switch:
Table of Contents

Advertisement

Please note that users granted access to the Switch will be granted normal user privileges on the Switch. To gain access to
administrator level privileges, the user must access the Enable Admin using a CLI command.

Application Authentication Settings

This window is used to configure switch configuration applications (console, Telnet, SSH, web) for login at the user level
and at the administration level (Enable Admin) utilizing a previously configured method list. To view the following window,
click Security > Access Authentication Control > Application Authentication Settings:
The following parameters can be set:
Parameter
Application
Login Method List
Enable Method List
Click Apply to implement changes made.

Authentication Server Host

This window will set user-defined Authentication Server Hosts for the TACACS+ / RADIUS security protocols on the
Switch. When a user attempts to access the Switch with Authentication Policy enabled, the Switch will send authentication
packets to a remote TACACS+ / RADIUS server host on a remote host. The TACACS+ / RADIUS server host will then
verify or deny the request and return the appropriate message to the Switch. More than one authentication protocol can be
run on the same physical server host but, remember that TACACS+ / RADIUS are separate entities and are not compatible
with each other. The maximum supported number of server hosts is 16.
To view the following window, click Security > Access Authentication Control > Authentication Server Host:
DGS-3048 Gigabit Ethernet Switch Manual
NOTE: TACACS+ is a separate entitie and are not compatible. The Switch
and the server must be configured exactly the same, using the same
protocol. (For example, if the Switch is set up for TACACS+ authentication,
so must be the host server.)
Figure 10- 10.Application Authentication Settings Window
Description
Lists the configuration applications on the Switch. The user may configure the Login
Method List and Enable Method List for authentication for users utilizing the Console
(Command Line Interface) application, the Telnet application, SSH and the Web
(HTTP) application.
Using the pull down menu, configure an application for normal login on the user level,
utilizing a previously configured method list. The user may use the default Method List
or other Method List configured by the user. See the Login Method Lists window, in this
section, for more information.
Using the pull down menu, configure an application for normal login on the user level,
utilizing a previously configured method list. The user may use the default Method List
or other Method List configured by the user. See the Enable Method Lists window, in
this section, for more information
87

Advertisement

Table of Contents
loading

Table of Contents