Netgear GS110TP GS108Tv2/GS110TP Software Reference Manual - Page 182
Configuring Management Access, RADIUS, TACACS, Cancel, Apply, Security, Access
UPC - 606449069129
View all Netgear GS110TP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 182 highlights
GS108T and GS110TP Smart Switch Software Administration Manual • RADIUS: The user's ID and password will be authenticated using the RADIUS server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch uses Method 2 to authenticate the user. • TACACS+: The user's ID and password will be authenticated using the TACACS+ server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch attempts user authentication Method 2. • None: The authentication method is unspecified. This option is only available for Method 2 and Method 3. 3. Use the menu in the 2 column to select the authentication method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. This parameter will not appear when you first create a new login list. 4. Use the menu in the 3 column to select the authentication method, if any, that should appear third in the selected authentication login list. This parameter will not appear when you first create a new login list. 5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 6. If you make changes to the page, click Apply to apply the changes to the system. Configuring Management Access From the Access page, you can configure HTTP and Secure HTTP access to the GS108T or GS110TP management interface. You can also configure Access Control Profiles and Access Rules. The Security Access tab contains the following folders: • "HTTP Configuration" on page 5-15 • "Secure HTTP Configuration" on page 5-16 • "Certificate Download" on page 5-18 • "Access Profile Configuration" on page 5-19 • "Access Rule Configuration" on page 5-21 5-14 v1.0, April 2010 Managing Device Security