Application Authentication Settings; Authentication Server Group - D-Link DGS-3024 Manual

Managed 24-port gigabit ethernet switch
Hide thumbs Also See for DGS-3024:
Table of Contents

Advertisement

Click Apply to implement changes made.

Application Authentication Settings

This window is used to configure Switch configuration applications (console, Telnet, SSH, web) for login at the user level
and at the administration level (Enable Admin) utilizing a previously configured method list. To view the following
window, click Security > Access Authentication Control > Application Authentication Settings:
The following parameters can be set:
Parameter
Application
Login Method List
Enable Method List
Click Apply to implement changes made.

Authentication Server Group

This window will allow users to set up Authentication Server Groups on the Switch. A server group is a technique used to
group TACACS/XTACACS/TACACS+/RADIUS server hosts into user-defined categories for authentication using method
lists. The user may define the type of server group by protocol or by previously defined server group. The Switch has three
built-in Authentication Server Groups that cannot be removed but can be modified. Up to eight authentication server hosts
may be added to any particular group.
To view the following window, click Security > Access Authentication Control > Authentication Server Group:
DGS-3024 Gigabit Ethernet Switch Manual
Figure 8- 9. Application Authentication Settings window
Description
Lists the configuration applications on the Switch. The user may configure the
Login Method List and Enable Method List for authentication for users utilizing the
Console (Command Line Interface) application, the Telnet application, SSH and
the Web (HTTP) application.
Using the pull down menu, configure an application for normal login on the user
level, utilizing a previously configured method list. The user may use the default
Method List or other Method List configured by the user. See the Login Method
Lists window, in this section, for more information.
Using the pull down menu, configure an application for normal login on the user
level, utilizing a previously configured method list. The user may use the default
Method List or other Method List configured by the user. See the Enable Method
Lists window, in this section, for more information
95

Advertisement

Table of Contents
loading

Table of Contents