Netgear GSM7212P GSM5212P/GSM7212P/GSM7212F/GSM7224P User Manual - Page 238

Dot1x Authentication List, DELETE, Security, Management Security &gt, List Name, Local, Radius

Page 238 highlights

Web Management User Guide 3. Use the dropdown menu to select the method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. Note that this parameter will not appear when you first create a new login list. 4. Use the dropdown menu to select the method, if any, that should appear third in the selected authentication login list. 5. Click ADD to add a new login list to the switch. 6. Click DELETE to remove the selected authentication enable list from the configuration. You can only use this button if you have Read/Write access. The change will not be retained across a power cycle unless you perform a save. Dot1x Authentication List You use this page to configure dot1x lists. A dot1x list specifies the authentication method(s) you want to be used to validate port access for the users associated with the list. Only one dot1x can be supported. To display the Dot1x Authentication List page, click Security  Management Security > Authentication List  Dot1x Authentication List. 1. List Name - Select the dot1x list name for which you want to configure data. 2. Use the dropdown menu to select the method that should appear first in the selected authentication login list. The options are: • Local - The user's locally stored ID and password will be used for authentication. • Radius - The user's ID and password will be authenticated using the RADIUS server instead of locally. • None - The user will not be authenticated. HTTP Authentication List You use this page to configure HTTP lists. A HTTP list specifies the authentication method(s) you want used to validate switch or port access through HTTP. To display the HTTP Authentication List page, click Security  Management Security > Authentication List  HTTP Authentication List. 238

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385

238
Web Management User Guide
3.
Use the dropdown menu to select the method, if any, that should appear second in the
selected authentication login list. This is the method that will be used if the first method times
out. If you select a method that does not time out as the second method, the third method
will not be tried. Note that this parameter will not appear when you first create a new login
list.
4.
Use the dropdown menu to select the method, if any, that should appear third in the selected
authentication login list.
5.
Click
ADD
to add a new login list to the switch.
6.
Click
DELETE
to remove the selected authentication enable list from the configuration. You
can only use this button if you have Read/Write access. The change will not be retained
across a power cycle unless you perform a save.
Dot1x Authentication List
You use this page to configure dot1x lists. A dot1x list specifies the authentication method(s)
you want to be used to validate port access for the users associated with the list. Only one
dot1x can be supported.
To display the Dot1x Authentication List page, click
Security
Management Security >
Authentication List
Dot1x Authentication List
.
1.
List Name
- Select the dot1x list name for which you want to configure data.
2.
Use the dropdown menu to select the method that should appear first in the selected
authentication login list. The options are:
Local
- The user's locally stored ID and password will be used for authentication.
Radius
- The user's ID and password will be authenticated using the RADIUS server
instead of locally.
None
- The user will not be authenticated.
HTTP Authentication List
You use this page to configure HTTP lists. A HTTP list specifies the authentication method(s)
you want used to validate switch or port access through HTTP.
To display the HTTP Authentication List page, click
Security
Management Security >
Authentication List
HTTP Authentication List
.