D-Link DES-3526DC Product Manual - Page 141

Policy & Parameters, Application's Authentication Settings

Page 141 highlights

xStack DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual Policy & Parameters This command will enable an administrator-defined authentication policy for users trying to access the Switch. When enabled, the device will check the Login Method List and choose a technique for user authentication upon login. To access the following window, click Security Management > Access Authentication Control > Policy & Parameters: Figure 7- 5. Policy & Parameters Settings window The following parameters can be set: Parameters Description Authentication Policy Use the pull-down menu to enable or disable the Authentication Policy on the Switch. Response Timeout (0- This field will set the time the Switch will wait for a response of authentication from the user. 255) The user may set a time between 0 and 255 seconds. The default setting is 30 seconds. User Attempts (1-255) This command will configure the maximum number of times the Switch will accept authentication attempts. Users failing to be authenticated after the set amount of attempts will be denied access to the Switch and will be locked out of further authentication attempts. Command line interface users will have to wait 60 seconds before another authentication attempt. Telnet and web users will be disconnected from the Switch. The user may set the number of attempts from 1 to 255. The default setting is 3. Click Apply to implement changes made. Application's Authentication Settings This window is used to configure switch configuration applications (console, Telnet, SSH, web) for login at the user level and at the administration level (Enable Admin) utilizing a previously configured method list. To view the following window, click Security Management > Access Authentication Control > Application Authentication Settings: Figure 7- 6. Application's Authentication Settings window The following parameters can be set: Parameter Description Application Login Method List Lists the configuration applications on the Switch. The user may configure the Login Method List and Enable Method List for authentication for users utilizing the Console (Command Line Interface) application, the Telnet application, SSH and the WEB (HTTP) application. Using the pull down menu, configure an application for normal login on the user level, utilizing a previously configured method list. The user may use the default Method List or other Method List configured by the user. See the Login Method Lists window, in this section, for more information. 127

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260

xStack DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
127
Policy & Parameters
This command will enable an administrator-defined authentication policy for users trying to access the Switch. When enabled, the
device will check the Login Method List and choose a technique for user authentication upon login.
To access the following window, click
Security Management > Access Authentication Control > Policy & Parameters
:
Figure 7- 5. Policy & Parameters Settings window
The following parameters can be set:
Parameters
Description
Authentication Policy
Use the pull-down menu to enable or disable the Authentication Policy on the Switch.
Response Timeout (0-
255)
This field will set the time the Switch will wait for a response of authentication from the user.
The user may set a time between
0
and
255
seconds. The default setting is
30
seconds.
User Attempts (1-255)
This command will configure the maximum number of times the Switch will accept
authentication attempts. Users failing to be authenticated after the set amount of attempts
will be denied access to the Switch and will be locked out of further authentication attempts.
Command line interface users will have to wait
60
seconds before another authentication
attempt. Telnet and web users will be disconnected from the Switch. The user may set the
number of attempts from
1
to
255
. The default setting is
3
.
Click
Apply
to implement changes made.
Application's Authentication Settings
This window is used to configure switch configuration applications (console, Telnet, SSH, web) for login at the user level and at
the administration level (Enable Admin
)
utilizing a previously configured method list. To view the following window, click
Security Management > Access Authentication Control > Application Authentication Settings:
Figure 7- 6. Application's Authentication Settings window
The following parameters can be set:
Parameter
Description
Application
Lists the configuration applications on the Switch. The user may configure the Login Method
List and Enable Method List for authentication for users utilizing the Console (Command Line
Interface) application, the Telnet application, SSH and the WEB (HTTP) application.
Login Method List
Using the pull down menu, configure an application for normal login on the user level, utilizing
a previously configured method list. The user may use the default Method List or other Method
List configured by the user. See the
Login Method Lists
window, in this section, for more
information.