D-Link 3100 24P User Manual - Page 155

Defining Application Authentication Settings

Page 155 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual Defining Application Authentication Settings Application Authentication permits network administrators to assign authentication methods for user authentication. For example, console users can be authenticated by Authentication List 1, while Telnet users are authenticated by Authentication List 2. 1. Click Security > Access Authentication Control > Application Authentication Settings. The Application Authentication Settings Page opens: Figure 5-11. Application Authentication Settings Page The Application Authentication Settings Page contains the following fields: Field Application Description Indicates the authentication application for which the Login Method or Enable Method lists are defined. The possible field values are: Console - Indicates that Authentication profiles are used to authenticate console users. Telnet - Indicates that Authentication profiles are used to authenticate Telnet users. Secure Telnet (SSH) - Indicates that Authentication profiles are used to authenticate Secure Shell (SSH) users. SSH provides clients secure and encrypted remote connections to a device. Login Method List Defines the method used by the application to authenticate normal login. http_method_list and https_method_list are fixed method names for http and https respectively. Enable Method List Defines the method used by the application to enable a normal login. 2. Select the login method for the Console, Telnet, and Secure Telnet (SSH ) from the list under Login Method List. 3. Select the enable method for the Console, Telnet, and Secure Telnet (SSH ) from the list under Enable Method List. 4. Click . The Application Authentication settings are defined, and the device is updated. 141

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Defining Application Authentication Settings
Application Authentication permits network administrators to assign authentication methods for user authentication. For
example, console users can be authenticated by Authentication List 1, while Telnet users are authenticated by
Authentication List 2.
1.
Click
Security > Access Authentication Control > Application Authentication Settings
. The
Application
Authentication Settings Page
opens:
Figure 5-11. Application Authentication Settings Page
The
Application Authentication Settings Page
contains the following fields:
Field
Description
Application
Indicates the authentication application for which the Login Method or Enable Method lists
are defined. The possible field values are:
Console
— Indicates that Authentication profiles are used to authenticate console users.
Telnet
— Indicates that Authentication profiles are used to authenticate Telnet users.
Secure Telnet (SSH)
— Indicates that Authentication profiles are used to authenticate
Secure Shell (SSH) users. SSH provides clients secure and encrypted remote connections
to a device.
Login Method List
Defines the method used by the application to authenticate normal login.
http_method_list and https_method_list are fixed method names for http and https
respectively.
Enable Method List
Defines the method used by the application to enable a normal login.
2.
Select the login method for the Console, Telnet, and Secure Telnet (SSH ) from the list under
Login Method List
.
3.
Select the enable method for the Console, Telnet, and Secure Telnet (SSH ) from the list under
Enable Method List
.
4.
Click
. The Application Authentication settings are defined, and the device is updated.
141