D-Link DGS-3120-24TC Product Manual - Page 249
Enable Method Lists Settings, Delete, Method List Name, Priority 1
View all D-Link DGS-3120-24TC manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 249 highlights
xStack® DGS-3120 Series Managed Switch Web UI Reference Guide Figure 8-55 Login Method Lists Settings window The Switch contains one Method List that is set and cannot be removed, yet can be modified. To delete a Login Method List defined by the user, click the Delete button corresponding to the entry desired to be deleted. To modify a Login Method List, click on its corresponding Edit button. The fields that can be configured are described below: Parameter Description Method List Name Enter a method list name defined by the user of up to 15 characters. Priority 1, 2, 3, 4 The user may add one, or a combination of up to four of the following authentication methods to this method list: tacacs - Adding this parameter will require the user to be authenticated using the TACACS protocol from a remote TACACS server. xtacacs - Adding this parameter will require the user to be authenticated using the XTACACS protocol from a remote XTACACS server. tacacs+ - Adding this parameter will require the user to be authenticated using the TACACS+ protocol from a remote TACACS+ server. radius - Adding this parameter will require the user to be authenticated using the RADIUS protocol from a remote RADIUS server. local - Adding this parameter will require the user to be authenticated using the local user account database on the Switch. none - Adding this parameter will require no authentication needed to access the Switch. Click the Apply button to accept the changes made. Click the Edit button to re-configure the specific entry. Click the Delete button to remove the specific entry. Enable Method Lists Settings Users can set up Method Lists to promote users with user level privileges to Administrator (Admin) level privileges using authentication methods on the Switch. Once a user acquires normal user level privileges on the Switch, he or she must be authenticated by a method on the Switch to gain administrator privileges on the Switch, which is defined by the Administrator. A maximum of eight Enable Method Lists can be implemented on the Switch, one of which is a default Enable Method List. This default Enable Method List cannot be deleted but can be configured. The sequence of methods implemented in this command will affect the authentication result. For example, if a user enters a sequence of methods like TACACS - XTACACS - Local Enable, the Switch will send an authentication request to the first TACACS host in the server group. If no verification is found, the Switch will send an authentication request to the second TACACS host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed, XTACACS. If no authentication takes place using the XTACACS list, the Local Enable password set in the Switch is used to authenticate the user. 241