Policy & Parameters - D-Link DES-3526 Manual

Managed layer 2 ethernet switch 24-port 10/100mbps and 2ge ports
Hide thumbs Also See for DES-3526:
Table of Contents

Advertisement

the Switch, the Switch will ask the first Authentication Server Hosts for authentication. If no
authentication is made, the second server host in the list will be queried, and so on. The built-in
Authentication Server Groups can only have hosts that are running the specified protocol. For
example, the TACACS Authentication Server Groups can only have TACACS Authentication Server
Hosts.
The administrator for the Switch may set up six different authentication techniques per user-defined
method list (TACACS/XTACACS/TACACS+/RADIUS/local/none) for authentication. These tech-
niques will be listed in an order preferable, and defined by the user for normal user authentication on
the Switch, and may contain up to eight authentication techniques. When a user attempts to access the
Switch, the Switch will select the first technique listed for authentication. If the first technique goes
through its Authentication Server Hosts and no authentication is returned, the Switch will then go to
the next technique listed in the server group for authentication, until the authentication has been
verified or denied, or the list is exhausted.
Please note that users granted access to the Switch will be granted normal user privileges on the
Switch. To gain access to administrator level privileges, the user must access the Enable Admin
window and then enter a password, which was previously configured by the administrator of the
Switch.
NOTE: TACACS, XTACACS and TACACS+ are separate entities and are
not compatible. The Switch and the server must be configured exactly the
same, using the same protocol. (For example, if the Switch is set up for
TACACS authentication, so must be the host server.)
Policy & Parameters
This command will enable an administrator-defined authentication policy for users trying to access the
Switch. When enabled, the device will check the Login Method List and choose a technique for user
authentication upon login.
To access the following window, click Security Management > Access Authentication Control >
Policy & Parameters:
The following parameters can be set:
Parameters
Authentication Policy
Response Timeout (0-
255)
User Attempts (1-255)
DES-3526 / DES-3526DC Fast Ethernet Layer 2 Switch
Figure 7- 5. Policy & Parameters Settings window
Description
Use the pull-down menu to enable or disable the Authentication Policy on the
Switch.
This field will set the time the Switch will wait for a response of authentication from
the user. The user may set a time between 0 and 255 seconds. The default set-
ting is 30 seconds.
This command will configure the maximum number of times the Switch will accept
authentication attempts Users failing to be authenticated after the set amount of
124

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Des-3526dc

Table of Contents