D-Link 3100 24P User Manual - Page 159

Defining Enable Methods, Security > Access Authentication Control > Enable Method Lists, Field

Page 159 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual Defining Enable Methods Network users must first login to the device on the Enable Method Lists Page. Access as non-administrative users is granted. The Enable Method Lists Page allows network mangers to assign user privileges using authentication methods on the device. Once a user is assigned a normal user level privileges the network user is authenticated and granted network access and configuration privileges. A maximum of four Enable Method Lists can be defined on the device. The Enable Method List cannot be deleted but can be configured. User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected authentication method is RADIUS, Local, and the RADIUS server is not available; the user is authenticated locally. To define authentication methods: 1. Click Security > Access Authentication Control > Enable Method Lists. The Enable Method Lists Page opens: Figure 5-14. Enable Method Lists Page The Enable Method Lists Page contains the following fields: Field Method List Name Description Defines the method list name. The field is user-defined besides the http_method_list and https_method_list which cannot be deleted or renamed. Method 1 Indicates the first method used to authenticate the network user. The possible field values are: RADIUS - User authentication occurs at the RADIUS server. TACACS+ - The user authentication occurs at the TACACS+ server. None - No user authentication occurs. Local - User authentication occurs at the device level. The device checks the user name and password for authentication. 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Defining Enable Methods
Network users must first login to the device on the
Enable Method Lists
Page. Access as non-administrative users is granted.
The
Enable Method Lists
Page
allows network mangers to assign user privileges using authentication methods on the device.
Once a user is assigned a normal user level privileges the network user is authenticated and granted network access and
configuration privileges. A maximum of four Enable Method Lists can be defined on the device. The Enable Method List
cannot be deleted but can be configured.
User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next
selected method is used. For example, if the selected authentication method is RADIUS, Local, and the RADIUS server is
not available; the user is authenticated locally. To define authentication methods:
1.
Click
Security > Access Authentication Control > Enable Method Lists
. The
Enable Method Lists Page
opens:
Figure 5-14. Enable Method Lists Page
The Enable Method Lists Page contains the following fields:
Field
Description
Method List Name
Defines the method list name. The field is user-defined besides the http_method_list and
https_method_list which cannot be deleted or renamed.
Method 1
Indicates the first method used to authenticate the network user. The possible field values are:
RADIUS
— User authentication occurs at the RADIUS server.
TACACS
+ — The user authentication occurs at the TACACS+ server.
None
— No user authentication occurs.
Local
— User authentication occurs at the device level. The device checks the user name
and password for authentication.
145