D-Link DES-3528 Product Manual - Page 270

Authentication Server Settings

Page 270 highlights

xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide NOTE: The user must configure Authentication Server Hosts using the Authentication Server Hosts window before adding hosts to the list. Authentication Server Hosts must be configured for their specific protocol on a remote centralized server before this function can work properly. NOTE: The three built-in server groups can only have server hosts running the same TACACS daemon. TACACS/XTACACS/TACACS+ protocols are separate entities and are not compatible with each other. Authentication Server Settings User-defined Authentication Server Hosts for the TACACS / XTACACS / TACACS+ / RADIUS security protocols can be set on the Switch. When a user attempts to access the Switch with Authentication Policy enabled, the Switch will send authentication packets to a remote TACACS / XTACACS / TACACS+ / RADIUS server host on a remote host. The TACACS / XTACACS / TACACS+ / RADIUS server host will then verify or deny the request and return the appropriate message to the Switch. More than one authentication protocol can be run on the same physical server host but, remember that TACACS / XTACACS / TACACS+ / RADIUS are separate entities and are not compatible with each other. The maximum supported number of server hosts is 16. To view this window, click Security > Access Authentication Control > Authentication Server Settings, as shown below: Figure 8-65 Authentication Server Settings window The fields that can be configured are described below: Parameter Description IP Address The IP address of the remote server host to add. Protocol The protocol used by the server host. The user may choose one of the following: TACACS - Enter this parameter if the server host utilizes the TACACS protocol. XTACACS - Enter this parameter if the server host utilizes the XTACACS protocol. TACACS+ - Enter this parameter if the server host utilizes the TACACS+ protocol. RADIUS - Enter this parameter if the server host utilizes the RADIUS protocol. Key (Max: 254 characters) Authentication key to be shared with a configured TACACS+ or RADIUS servers only. Specify an alphanumeric string up to 254 characters. Port (1-65535) Enter a number between 1 and 65535 to define the virtual port number of the authentication protocol on a server host. The default port number is 49 for TACACS/XTACACS/TACACS+ servers and 1813 for RADIUS servers but the user may set a unique port number for higher security. Timeout (1-255) Enter the time in seconds the Switch will wait for the server host to reply to an authentication request. The default value is 5 seconds. Retransmit (1-20) Enter the value in the retransmit field to change how many times the device will resend an authentication request when the TACACS server does not respond. Click the Apply button to accept the changes made. 261

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367

xStackĀ® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
NOTE:
The user must configure Authentication Server Hosts using the Authentication Server Hosts
window before adding hosts to the list. Authentication Server Hosts must be configured for their
specific protocol on a remote centralized server before this function can work properly.
NOTE:
The three built-in server groups can only have server hosts running the same TACACS daemon.
TACACS/XTACACS/TACACS+ protocols are separate entities and are not compatible with each
other.
Authentication Server Settings
User-defined Authentication Server Hosts for the TACACS / XTACACS / TACACS+ / RADIUS security protocols can
be set on the Switch. When a user attempts to access the Switch with Authentication Policy enabled, the Switch will
send authentication packets to a remote TACACS / XTACACS / TACACS+ / RADIUS server host on a remote host.
The TACACS / XTACACS / TACACS+ / RADIUS server host will then verify or deny the request and return the
appropriate message to the Switch. More than one authentication protocol can be run on the same physical server host
but, remember that TACACS / XTACACS / TACACS+ / RADIUS are separate entities and are not compatible with
each other. The maximum supported number of server hosts is 16.
To view this window, click
Security > Access Authentication Control > Authentication Server Settings
, as shown
below:
Figure 8-65 Authentication Server Settings window
The fields that can be configured are described below:
Parameter
Description
IP Address
The IP address of the remote server host to add.
Protocol
The protocol used by the server host. The user may choose one of the following:
TACACS
- Enter this parameter if the server host utilizes the TACACS protocol.
XTACACS
- Enter this parameter if the server host utilizes the XTACACS protocol.
TACACS+
- Enter this parameter if the server host utilizes the TACACS+ protocol.
RADIUS
- Enter this parameter if the server host utilizes the RADIUS protocol.
Key (Max: 254
characters)
Authentication key to be shared with a configured TACACS+ or RADIUS servers only.
Specify an alphanumeric string up to 254 characters.
Port (1-65535)
Enter a number between
1
and
65535
to define the virtual port number of the
authentication protocol on a server host. The default port number is
49
for
TACACS/XTACACS/TACACS+ servers and
1813
for RADIUS servers but the user
may set a unique port number for higher security.
Timeout (1-255)
Enter the time in seconds the Switch will wait for the server host to reply to an
authentication request. The default value is
5
seconds.
Retransmit (1-20)
Enter the value in the retransmit field to change how many times the device will resend
an authentication request when the TACACS server does not respond.
Click the
Apply
button to accept the changes made.
261