Ubiquiti EdgeSwitch ES-24-250W Administration Manual page 44

User interface for poe switches
Hide thumbs Also See for EdgeSwitch ES-24-250W:
Table of Contents

Advertisement

EdgeSwitch
Administration Guide
The following table shows the fields for the Authentication List Configuration page.
Field
List Name
Access Type
Method Options
List Type
Access Line
Authentication Methods – This section of the Add New Authentication List dialog box contains the fields that you use to configure the
authentication methods for the authentication list.
Available Methods
Selected Methods
Use the buttons to perform the following tasks:
• To configure a new authentication list, click Add, configure the settings in the Add New Authentication List
dialog box, and click Submit to apply the settings to the switch.
• To edit a list, select the list's entry, click Edit, configure the settings in the Edit Authentication List dialog
box, and click Submit to apply the settings to the switch. Available settings depend on the list type.
• To remove a non-default authentication list, click the entry's
• To reset the Method Options for a default authentication list to the factory default values, click the entry's
 button and confirm the action.
• Click Refresh to update the information on the screen.
To retain the changes across the switch's next power cycle, click System > Configuration Storage > Save.
To create a new authentication list, see "Authentication Server Users" on page 37. To assign users to a
specific authentication list, see "User Accounts" on page 35. To configure the 802.1X port security users,
see "RADIUS Settings" on page 218.
Ubiquiti Networks, Inc.
Authentication List Configuration Fields
Description
The name of the authentication list. This field can be configured only when adding a new
authentication list.
How the user accesses the system. This field can be configured only when a new authentication list is
added, and only the Login and Enable access types can be selected. The access types are as follows:
Login
User EXEC-level management access to the command-line interface (CLI) using a Telnet
or SSH session. Access at this level has a limited number of CLI commands available to view or
configure the system.
Enable
Privileged EXEC-level management access to the CLI using a Telnet or SSH session. In
Privileged EXEC mode, read-write users have access to all CLI commands.
HTTP
Management-level access to the web-based user interface using HTTP.
HTTPS
Management-level access to the web-based user interface using secure HTTP.
Dot1x
Port-based access to the network through a switch port that is controlled by IEEE 802.1X.
The method(s) used to authenticate a user who attempts to access the management interface or
network. The possible methods are as follows:
Enable
Uses the locally configured Enable password to verify the user's credentials.
Local
Uses the ID and password in the Local User database to verify the user's credentials.
RADIUS
Sends the user's ID and password to the configured RADIUS server to verify the user's
credentials.
TACACS+
Sends the user's ID and password to the configured TACACS+ server to verify the user's
credentials.
None
No authentication is used.
IAS
Uses the local Internal Authentication Server (IAS) database for 802.1X port-based
authentication.
The type of list, which is one of the following:
Default
The list is preconfigured on the system. This type of list cannot be deleted, and only the
Method Options are configurable.
Configured
The list has been added by a user.
The access method(s) that use the list for authentication. The settings for this field are configured on
the Authentication Selection page.
The authentication methods that can be used for the authentication list.
To set the authentication method, select the method from the Available Methods field and click
move it to the Selected Methods field.
The authentication methods currently configured for the list. If this field lists multiple methods, the
methods are applied in the order listed – if user authentication fails using the first method, the device
tries again using the second method, and so on. If the current method is None, no authentication is
performed (user is granted unconditional access); therefore, None must be the last method in the list.
To remove a method from the list, select it and click
Configuring System Information
to return it to the Available Methods field.
button and confirm the action.
to
43

Advertisement

Table of Contents
loading

Table of Contents