Configuring Line Logon Authentication; System Time Configuration; Overview; Setting The System Time - D-Link xStack DGS-3610 Series Configuration Manual

Hide thumbs Also See for xStack DGS-3610 Series:
Table of Contents

Advertisement

Chapter 2 Configuration of Switch Basic Management
2.3.3
Configuring Line Logon
Authentication
To establish the line logon identity authentication, run the following specific commands in the
line configuration mode:
Command
DGS-3610(config-line)# login local
DGS-3610(config-line)# login
authentication {default | list-name}
Note
2.4

System Time Configuration

2.4.1

Overview

Every network device has its system clock, which provides the detaild date (year, month,
day) , time (hour, minute, second) and the week. When you use a network device for the first
time, you must configure the system clock to current date and time manually. Of course, you
can adjust the system clock when necessary. System clock is used for system logging and
other functions that need record the time when an event occurs.
2.4.2

Setting the System Time

You can configure the system time on the network device manually. When you have
configured the clock on the network device, the network device will work with the time you
configured. Even if the network device is powered off, the clock still runs. Once you have
configured the system clock, you do not need to configure it again unless you want to adjust
the time of the device..
However, for the network devices which don't provide the hardware clock, the manual setting
of the time for the network devices is actually to set the software clock, and it only is valid for
the operation of this time. When the network devices are powered down, the manual setting
of the time will not be valid.
2-6
For how to set the AAA mode, configure the Radius service and
configure the method list, see the sections in AAA configuration.
DGS-3610 Series Configuration Guide
Function
Set local authentication for line logon not in AAA
mode.
Set AAA authentication for line logon in AAA mode.
The authentication methods in the AAA method list will
be used for the authentication, including the Radius
authentication, local authentication and no
authentication.

Advertisement

Table of Contents
loading

Table of Contents