Authentication Server Group - D-Link xStack DGS-3400 Series User Manual

Xstack dgs-3400 series layer 2 gigabit ethernet managed switch
Hide thumbs Also See for xStack DGS-3400 Series:
Table of Contents

Advertisement

xStack DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
Parameter
Application
Login Method List
Enable Method List
Click Apply to implement changes made.

Authentication Server Group

This window will allow users to set up Authentication Server Groups on the Switch. A server group is a technique used to group
TACACS/XTACACS/TACACS+/RADIUS server hosts into user-defined categories for authentication using method lists. The
user may define the type of server group by protocol or by previously defined server group. The Switch has three built-in
Authentication Server Groups that cannot be removed but can be modified. Up to eight authentication server hosts may be added
to any particular group.
To view the following window, click Security > Access Authentication Control > Authentication Server Group:
This screen displays the Authentication Server Groups on the Switch. The Switch has four built-in Authentication Server Groups
that cannot be removed but can be modified. To modify a particular group, click its hyperlinked Group Name, which will then
display the following window.
Figure 9- 18. Add a Server Host to Server Group (XTACACS) window.
To add an Authentication Server Host to the list, enter its IP address in the IP Address field, choose the protocol associated with
the IP address of the Authentication Server Host and click Add to add this Authentication Server Host to the group.
Description
Lists the configuration applications on the Switch. The user may configure the Login Method
List and Enable Method List for authentication for users utilizing the Console (Command Line
Interface) application, the Telnet application, SSH and the Web (HTTP) application.
Using the pull down menu, configure an application for normal login on the user level,
utilizing a previously configured method list. The user may use the default Method List or
other Method List configured by the user. See the Login Method Lists window, in this section,
for more information.
Using the pull down menu, configure an application for normal login on the user level,
utilizing a previously configured method list. The user may use the default Method List or
other Method List configured by the user. See the Enable Method Lists window, in this
section, for more information
Figure 9- 17. Authentication Server Group window
197

Advertisement

Table of Contents
loading

Table of Contents