Policy & Parameters - D-Link DGS-3312SR Product Manual

12-port gigabit layer 3 stackable switch
Hide thumbs Also See for DGS-3312SR:
Table of Contents

Advertisement

authentication is made, the second server host in the list will be queried, and so on. The built-in Authentication Server
Groups can only have hosts that are running the specified protocol. For example, the TACACS Authentication Server
Groups can only have TACACS Authentication Server Hosts.
The administrator for the switch may set up six different authentication techniques per user-defined method list
(TACACS/XTACACS/TACACS+/RADIUS/local/none) for authentication. These techniques will be listed in an order
preferable, and defined by the user for normal user authentication on the switch, and may contain up to eight authentication
techniques. When a user attempts to access the switch, the switch will select the first technique listed for authentication. If
the first technique goes through its Authentication Server Hosts and no authentication is returned, the switch will then go to
the next technique listed in the server group for authentication, until the authentication has been verified or denied, or the
list is exhausted.
Please note that users granted access to the switch will be granted normal user privileges on the switch. To gain access to
administrator level privileges, the user must access the Enable Admin window and then enter a password, which was
previously configured by the administrator of the switch.
Policy & Parameters
This command will enable an administrator-defined authentication policy for users trying to access the switch. When
enabled, the device will check the Login Method List and choose a technique for user authentication upon login.
To access the following window, click Security > Access Authentication Control > Policy & Parameters:
The following parameters can be set:
Parameters
Authentication Policy
Response timeout(1-255)
User attempts(1-255)
Click Apply to implement changes made.
DGS-3312SR Gigabit Layer 3 Switch
NOTE: TACACS, XTACACS, and TACACS+ are separate entities and are
not compatible. The switch and the server must be configured exactly the
same, using the same protocol. (For example, if the switch is set up for
TACACS authentication, so must be the host server.)
Figure 6- 8. Policy & Parameters Settings window
Description
Use the pull-down menu to enable or disable the Authentication Policy on the
switch.
This field will set the time the Switch will wait for a response of authentication
from the user. The user may set a time between 1 and 255 seconds. The
default setting is 30 seconds.
This command will configure the maximum number of times the Switch will
accept authentication attempts. Users failing to be authenticated after the set
amount of attempts will be denied access to the switch and will be locked out
of further authentication attempts. Command line interface users will have to
wait 60 seconds before another authentication attempt. Telnet and web users
will be disconnected from the Switch. The user may set the number of
attempts from 1 to 255. The default setting is 3.
143

Advertisement

Table of Contents
loading

Table of Contents