D-Link DES-3228PA Installation Guide - Page 116

Defining Authentication Profiles, DES-3228PA Embedded Web System User Guide,

Page 116 highlights

DES-3228PA Embedded Web System User Guide Defining Authentication Profiles Authentication profiles allow network administrators to assign authentication methods for user authentication. User authentication can be performed either locally or on an external server. User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated locally. To define Authentication profiles: 1. Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profile Page opens. Figure 62: Authentication Profile Page The Authentication Profile Page contains the following fields: • Profile Name - Contains a list of user-defined authentication profile lists to which user-defined authentication profiles are added. • Methods - Defines the user authentication methods. The possible field values are: - None - Assigns no authentication method to the authentication profile. - Local - Authenticates the user at the device level. The device checks the user name and password for authentication. - RADIUS - Authenticates the user at the RADIUS server. - Line - Authenticates the user using a line password. - Enable - Authenticates the user using an enable password. • Remove - Removes the selected authentication profile. The possible field values are: - Checked - Removes the selected authentication profile. - Unchecked - Maintains the authentication profiles. 2. Click . The Add Authentication Profile Page opens. Page 113

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

DES-3228PA Embedded Web System User Guide
Page 113
Defining Authentication Profiles
Authentication profiles allow network administrators to assign authentication methods for user authentication.
User authentication can be performed either locally or on an external server. User authentication occurs in the
order the methods are selected. If the first authentication method is not available, the next selected method is
used. For example, if the selected authentication methods are RADIUS and Local, and the RADIUS server is not
available, then the user is authenticated locally. To define Authentication profiles:
1.
Click
System > Management
Security > Authentication > Authentication Profiles
. The
Authentication
Profile Page
opens.
Figure 62:
Authentication Profile Page
The
Authentication Profile Page
contains the following fields:
Profile Name
— Contains a list of user-defined authentication profile lists to which user-defined authentica-
tion profiles are added.
Methods
— Defines the user authentication methods. The possible field values are:
None
— Assigns no authentication method to the authentication profile.
Local
— Authenticates the user at the device level. The device checks the user name and password for
authentication.
RADIUS
— Authenticates the user at the RADIUS server.
Line
— Authenticates the user using a line password.
Enable
— Authenticates the user using an enable password.
Remove
— Removes the selected authentication profile. The possible field values are:
Checked
— Removes the selected authentication profile.
Unchecked
— Maintains the authentication profiles.
2.
Click
. The
Add Authentication Profile Page
opens.