D-Link DGS-3048 Product Manual - Page 103

Enable Method Lists, Security > Access Authentication Control > Enable Method Lists, Apply

Page 103 highlights

DGS-3048 Gigabit Ethernet Switch Manual Enable Method Lists The Enable Method Lists window is used to set up Method Lists to promote users with user level privileges to Administrator (Admin) level privileges using authentication methods on the Switch. Once a user acquires normal user level privileges on the Switch, he or she must be authenticated by a method on the Switch to gain administrator privileges on the Switch, which is defined by the Administrator. A maximum of eight (8) Enable Method Lists can be implemented on the Switch, one of which is a default Enable Method List. This default Enable Method List cannot be deleted but can be configured. The sequence of methods implemented in this command will affect the authentication result. For example, if a user enters a sequence of methods like TACACS+ - RADIUS - Local Enable, the Switch will send an authentication request to the first TACACS+ host in the server group. If no verification is found, the Switch will send an authentication request to the second TACACS+ host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed, RADIUS. If no authentication takes place using the RADIUS list, the Local Enable password set in the Switch is used to authenticate the user. Successful authentication using any of these methods will give the user an "Admin" privilege. NOTE: To set the Local Enable Password, see the next section, entitled Local Enable Password. To view the following table, click Security > Access Authentication Control > Enable Method Lists: Figure 10- 16. Enable Method List Settings Window To delete an Enable Method List defined by the user, click the under the Delete heading corresponding to the entry desired to be deleted. To modify an Enable Method List, click on its hyperlinked Method List Name. To configure a Method List, click the Add button. Both actions will result in the same window to configure: Figure 10- 17. Enable Method List - Add Window To define an Enable Login Method List, set the following parameters and click Apply: 91

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

DGS-3048 Gigabit Ethernet Switch Manual
Enable Method Lists
The
Enable Method Lists
window is used to set up Method Lists to promote users with user level privileges to
Administrator (Admin) level privileges using authentication methods on the Switch. Once a user acquires normal user level
privileges on the Switch, he or she must be authenticated by a method on the Switch to gain administrator privileges on the
Switch, which is defined by the Administrator. A maximum of eight (8) Enable Method Lists can be implemented on the
Switch, one of which is a default Enable Method List. This default Enable Method List cannot be deleted but can be config-
ured.
The sequence of methods implemented in this command will affect the authentication result. For example, if a user enters a
sequence of methods like TACACS+ - RADIUS - Local Enable, the Switch will send an authentication request to the first
TACACS+ host in the server group. If no verification is found, the Switch will send an authentication request to the second
TACACS+ host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same
sequence with the following protocol listed, RADIUS. If no authentication takes place using the RADIUS list, the Local
Enable password set in the Switch is used to authenticate the user.
Successful authentication using any of these methods will give the user an "Admin" privilege.
NOTE:
To set the Local Enable Password, see the next section, entitled
Local Enable Password.
To view the following table, click
Security > Access Authentication Control > Enable Method Lists
:
Figure 10- 16. Enable Method List Settings Window
To delete an Enable Method List defined by the user, click the
under the Delete heading corresponding to the entry
desired to be deleted. To modify an Enable Method List, click on its hyperlinked Method List Name. To configure a Method
List, click the
Add
button.
Both actions will result in the same window to configure:
Figure 10- 17. Enable Method List - Add Window
To define an Enable Login Method List, set the following parameters and click
Apply
:
91