Netgear GS724Tv4 Software Administration Manual - Page 186

Apply, To con the HTTPS authentication method for the defaultList, Security, Management Security

Page 186 highlights

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches 6. From the list in the 4 column, select the method, if any, that should appear fourth in the selected authentication login list. This is the method that will be used if all previous methods time out. 7. Click the Apply button. HTTPS Authentication List Use the HTTPS Authentication List to configure the default login list for secure HTTP (HTTPS).  To configure the HTTPS authentication method for the defaultList: 1. Select Security > Management Security > Authentication List > HTTPS Authentication List. 2. Select the check box next to the httpsList name. 3. From the list in the 1 column, select the authentication method that should appear first in the selected authentication login list. If you select a method that does not time out as the first method, such as Local, no other method will be tried, even if you have specified more than one method. This parameter will not appear when you first create a new login list. User authentication occurs in the order the methods are selected. Possible methods are as follows: • Local. The user's locally stored ID and password will be used for authentication. Since the local method does not time out, if you select this option as the first method, no other method will be tried, even if you have specified more than one method. • RADIUS. The user's ID and password will be authenticated using the RADIUS server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch uses Method 2 to authenticate the user. • TACACS+. The user's ID and password will be authenticated using the TACACS+ server. If you select RADIUS or TACACS+ as the first method and an error occurs during the authentication, the switch attempts user authentication Method 2. • None. The authentication method is unspecified. This option is only available for Method 2 and Method 3. 4. From the list in the 2 column, select the authentication method, if any, that should appear second in the selected authentication login list. This is the method that is used if the first method times out. If you select a method that does not time out as the second method, the third method is not tried. 5. From the list in the 3 column, select the authentication method, if any, that should appear third in the selected authentication login list. 6. From the list in the 4 column, select the method, if any, that should appear fourth in the selected authentication login list. This is the method that will be used if all previous methods time out. 7. Click the Apply button. Managing Device Security 186

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Managing Device Security
186
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
6.
From the list in the
4
column, select the method, if any, that should appear fourth in the
selected authentication login list.
This is the method that will be used if all previous methods time out.
7.
Click the
Apply
button.
HTTPS Authentication List
Use the HTTPS Authentication List to configure the default login list for secure HTTP
(HTTPS).
To configure the HTTPS authentication method for the defaultList:
1.
Select
Security
>
Management Security
>
Authentication List
>
HTTPS Authentication
List
.
2.
Select the check box next to the httpsList name.
3.
From the list in the
1
column, select the authentication method that should appear first in the
selected authentication login list.
If you select a method that does not time out as the first method, such as Local, no other
method will be tried, even if you have specified more than one method. This parameter
will not appear when you first create a new login list. User authentication occurs in the
order the methods are selected. Possible methods are as follows:
Local
. The user’s locally stored ID and password will be used for authentication.
Since the local method does not time out, if you select this option as the first method,
no other method will be tried, even if you have specified more than one method.
RADIUS
. The user’s ID and password will be authenticated using the RADIUS server.
If you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch uses Method 2 to authenticate the user.
TACACS+
. The user’s ID and password will be authenticated using the TACACS+
server. If you select RADIUS or TACACS+ as the first method and an error occurs
during the authentication, the switch attempts user authentication Method 2.
None
. The authentication method is unspecified. This option is only available for
Method 2 and Method 3.
4.
From the list in the
2
column, select the authentication method, if any, that should appear
second in the selected authentication login list.
This is the method that is used if the first method times out. If you select a method that
does not time out as the second method, the third method is not tried.
5.
From the list in the
3
column, select the authentication method, if any, that should appear
third in the selected authentication login list.
6.
From the list in the
4
column, select the method, if any, that should appear fourth in the
selected authentication login list.
This is the method that will be used if all previous methods time out.
7.
Click the
Apply
button.