Netgear GS110TP GS108Tv2/GS110TP Software Reference Manual - Page 182

Configuring Management Access, RADIUS, TACACS, Cancel, Apply, Security, Access

Page 182 highlights

GS108T and GS110TP Smart Switch Software Administration Manual • RADIUS: The user's ID and password will be authenticated using the RADIUS server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch uses Method 2 to authenticate the user. • TACACS+: The user's ID and password will be authenticated using the TACACS+ server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch attempts user authentication Method 2. • None: The authentication method is unspecified. This option is only available for Method 2 and Method 3. 3. Use the menu in the 2 column to select the authentication method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. This parameter will not appear when you first create a new login list. 4. Use the menu in the 3 column to select the authentication method, if any, that should appear third in the selected authentication login list. This parameter will not appear when you first create a new login list. 5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 6. If you make changes to the page, click Apply to apply the changes to the system. Configuring Management Access From the Access page, you can configure HTTP and Secure HTTP access to the GS108T or GS110TP management interface. You can also configure Access Control Profiles and Access Rules. The Security  Access tab contains the following folders: • "HTTP Configuration" on page 5-15 • "Secure HTTP Configuration" on page 5-16 • "Certificate Download" on page 5-18 • "Access Profile Configuration" on page 5-19 • "Access Rule Configuration" on page 5-21 5-14 v1.0, April 2010 Managing Device Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

GS108T and GS110TP Smart Switch Software Administration Manual
5-14
Managing Device Security
v1.0, April 2010
RADIUS
: The user's ID and password will be authenticated using the RADIUS server. If
you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch uses Method 2 to authenticate the user.
TACACS+
: The user's ID and password will be authenticated using the TACACS+ server.
If you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch attempts user authentication Method 2.
None
: The authentication method is unspecified. This option is only available for Method
2 and Method 3.
3.
Use the menu in the
2
column to select the authentication method, if any, that should appear
second in the selected authentication login list. This is the method that will be used if the first
method times out. If you select a method that does not time out as the second method, the third
method will not be tried. This parameter will not appear when you first create a new login list.
4.
Use the menu in the
3
column to select the authentication method, if any, that should appear
third in the selected authentication login list. This parameter will not appear when you first
create a new login list.
5.
Click
Cancel
to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
6.
If you make changes to the page, click
Apply
to apply the changes to the system.
Configuring Management Access
From the Access page, you can configure HTTP and Secure HTTP access to the GS108T or
GS110TP management interface. You can also configure Access Control Profiles and Access
Rules.
The
Security
Access
tab contains the following folders:
“HTTP Configuration” on page
5-15
“Secure HTTP Configuration” on page
5-16
“Certificate Download” on page
5-18
“Access Profile Configuration” on page
5-19
“Access Rule Configuration” on page
5-21