D-Link 3100 24 User Manual - Page 130

Field, Description, Method 2, To delete an Enable Method List Name, click

Page 130 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual Field Method 2 Description Indicates the second method used to authenticate the network user. The possible field values are: RADIUS - User authentication occurs at the RADIUS server. TACACS+ - The user authentication occurs at the TACACS+ server. None - No user authentication occurs. Local - User authentication occurs at the device level. The device checks the user name and password for authentication. Method 3 Indicates the third method used to authenticate the network user. The possible field values are: RADIUS - User authentication occurs at the RADIUS server. TACACS+ - The user authentication occurs at the TACACS+ server. None - No user authentication occurs. Local - User authentication occurs at the device level. The device checks the user name and password for authentication. Method 4 Indicates the fourth method used to authenticate the network user. The possible field values are: RADIUS - User authentication occurs at the RADIUS server. TACACS+ - The user authentication occurs at the TACACS+ server. None - No user authentication occurs. Local - User authentication occurs at the device level. The device checks the user name and password for authentication. 2. Define the Method List Name in the Method List Name field. 3. Select the methods used to authenticate network users in the Method 1, Method 2, Method 3 and, Method 4 fields. 4. Click . The Enable method and passwords are defined, and the device is updated. • To edit the Enable Method List, click adjacent to an Enable Method List Name on the list. The upper fields display the current values, which then can be edited. • To delete an Enable Method List Name, click updated. . The Enable Method Lists are defined, and the device is 118

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
118
Field
Description
Method 2
Indicates the second method used to authenticate the network user. The possible field values
are:
RADIUS
— User authentication occurs at the RADIUS server.
TACACS
+ — The user authentication occurs at the TACACS+ server.
None
— No user authentication occurs.
Local
— User authentication occurs at the device level. The device checks the user name
and password for authentication.
Method 3
Indicates the third method used to authenticate the network user. The possible field values are:
RADIUS
— User authentication occurs at the RADIUS server.
TACACS
+ — The user authentication occurs at the TACACS+ server.
None
— No user authentication occurs.
Local
— User authentication occurs at the device level. The device checks the user name
and password for authentication.
Method 4
Indicates the fourth method used to authenticate the network user. The possible field values
are:
RADIUS
— User authentication occurs at the RADIUS server.
TACACS
+ — The user authentication occurs at the TACACS+ server.
None
— No user authentication occurs.
Local
— User authentication occurs at the device level. The device checks the user name
and password for authentication.
2.
Define the Method List Name in the
Method List Name
field.
3.
Select the methods used to authenticate network users in the
Method 1, Method 2, Method 3 and, Method 4
fields.
4.
Click
. The Enable method and passwords are defined, and the device is updated.
To edit the Enable Method List, click
adjacent to an Enable Method List Name on the list. The upper
fields display the current values, which then can be edited.
To delete an Enable Method List Name, click
. The Enable Method Lists are defined, and the device is
updated.