D-Link DGS-3100-48 User Manual page 172

Gigabit stackable managed switch
Hide thumbs Also See for DGS-3100-48:
Table of Contents

Advertisement

Field
Method 2
Method 3
Method 4
2. Define the Method List Name in the Method List Name field.
3. Select the methods used to authenticate network users in the Method 1, Method 2, Method 3 and, Method 4
fields.
4. Click
To edit the Enable Method List, click
fields display the current values, which then can be edited.
To delete an Enable Method List Name, click
updated.
Description
Indicates the second method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Indicates the third method used to authenticate the network user. The possible field values are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
Indicates the fourth method used to authenticate the network user. The possible field values
are:
RADIUS — User authentication occurs at the RADIUS server.
TACACS+ — The user authentication occurs at the TACACS+ server.
None — No user authentication occurs.
Local — User authentication occurs at the device level. The device checks the user name
and password for authentication.
. The Enable method and passwords are defined, and the device is updated.
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
adjacent to an Enable Method List Name on the list. The upper
. The Enable Method Lists are defined, and the device is
156

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents