D-Link DGS-3200-10 Product Manual - Page 172

Enable Method Lists, Enable Method Lists window, Parameter, Description

Page 172 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Enable Method Lists Users can set up Method Lists to pro mote users with user lev el privileges to Ad ministrator (Ad min) level priv ileges using authentication methods on t he Swi tch. O nce a use r ac quires normal user l evel privileges on t he S witch, he or s he m ust be authenticated by a method on the Switch to gain administrator privileges on the Switch, which is defined by the Administrator. A maximum of e ight Enable Method Lists can be implemented on the Switch, one of which is a default Enable Method List. This default Enable Method List cannot be deleted but can be configured. The se quence of m ethods im plemented in this com mand will affect the au thentication result. F or exam ple, if a us er enters a sequence of m ethods lik e TACACS - XTACACS - Lo cal En able, the Switch will sen d an au thentication requ est to th e first TACACS host in th e serv er g roup. If no verification is found, th e Switch will sen d an au thentication requ est to th e second TACACS host in the server group and so on, until the list is ex hausted. At that point, the Switch will restart the same seq uence with the following protoc ol listed, XT ACACS. If no a uthentication ta kes place using t he XTACACS list, the L ocal E nable password set in the Switch is used to authenticate the user. Successful authentication using any of these methods will give the user an "Admin" privilege. NOTE: To set the Local Enable Password, see the next section, entitled Local Enable Password. To view the following window, click Security > Access Authentication Control > Enable Method Lists: Figure 5 - 42. Enable Method Lists window To delete an Enable Method List defined by the user, click the Delete button corresponding to the entry desired to be deleted. To modify an Enable Method List, click on its corresponding Edit button. To define an Enable Login Method List, set the following parameters and click Apply: Parameter Description Method List Name Priority 1, 2, 3, 4 Enter a method list name defined by the user of up to 15 characters. The user may add one, or a combination of up to four of the following authentication methods to this method list: local_enable - Adding this parameter will require the user to be authenticated using the local enable password database on the Switch. The local enable password must be set by the user in the next section entitled Local Enable Password. none - Adding this parameter will require no authentication to access the Switch. radius - Adding this parameter will require the user to be authenticated using the RADIUS protocol from a remote RADIUS server. tacacs - Adding this parameter will require the user to be authenticated using the TACACS protocol from a remote TACACS server. xtacacs - Adding this parameter will require the user to be authenticated using the XTACACS protocol from a remote XTACACS server. tacacs+ - Adding this parameter will require the user to be authenticated using the TACACS protocol from a remote TACACS server. 159

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
159
Enable Method Lists
Users can set
up Method Lists to pro mote users with user lev el privileges to Ad ministrator (Ad min) level priv ileges using
authentication methods on t he Swi tch. O nce a use r ac quires normal user l evel privileges on t he S witch, he or s he m ust be
authenticated by a method on the Switch to gain administrator privileges on the Switch, which is defined by the Administrator. A
maximum of eight Enable Method Lists can be implemented on the Switch, one of which is a default Enable Method List. This
default Enable Method List cannot be deleted but can be configured.
The sequence of methods implemented in this command will affect the
au thentication result. F or exam ple, if a us
er enters a
sequence of m ethods lik e TACACS - XTACACS - Lo cal En able, the Switch will sen d an au thentication requ est to th e first
TACACS host in th e serv er g roup. If no verification is found, th e Switch will sen d an au thentication requ est to th e second
TACACS host in the server group and so on, until the list is exhausted. At that point, the Switch will restart the same sequence
with the following protoc ol listed, XT ACACS. If no a uthentication ta kes place using t he XTACACS list, the L ocal E nable
password set in the Switch is used to authenticate the user.
Successful authentication using any of these methods will give the user an "Admin" privilege.
NOTE:
To set the Local Enable Password, see the next section, entitled Local Enable Password.
To view the following window, click
Security > Access Authentication Control > Enable Method Lists
:
Figure 5 - 42. Enable Method Lists window
To delete an Enable Method List defined by the user, click the
Delete
button corresponding to the entry desired to be deleted. To
modify an Enable Method List, click on its corresponding
Edit
button.
To define an Enable Login Method List, set the following parameters and click
Apply
:
Parameter
Description
Method List Name
Enter a method list name defined by the user of up to 15 characters.
Priority 1, 2, 3, 4
The user may add one, or a combination of up to four of the following authentication methods
to this method list:
local_enable
- Adding this parameter will require the user to be authenticated using the local
enable password database on the Switch. The local enable password must be set by the user
in the next section entitled Local Enable Password.
none
- Adding this parameter will require no authentication to access the Switch.
radius
- Adding this parameter will require the user to be authenticated using the RADIUS
protocol from a remote RADIUS server.
tacacs
- Adding this parameter will require the user to be authenticated using the TACACS
protocol from a remote TACACS server.
xtacacs
- Adding this parameter will require the user to be authenticated using the XTACACS
protocol from a remote XTACACS server.
tacacs+
- Adding this parameter will require the user to be authenticated using the TACACS
protocol from a remote TACACS server.