TP-Link T1500G-10MPS T1500G-10MPSUN V1 User Guide - Page 179

Global Config, Privilege Elevation

Page 179 highlights

local switch denies the user's access, the authentication process stops and no other authentication methods are attempted.  802.1X Authentication 802.1X protocol uses the RADIUS to provide detailed accounting information and flexible administrative control over authentication process. The Dot1x List feature defines the RADIUS server groups in the 802.1X authentication.  RADIUS/TACACS+ Server Users can configure the RADIUS/TACACS+ servers for the connection between the switch and the server.  Server Group Users can define the authentication server group with up to several servers running the same secure protocols, either RADIUS or TACACS+. Users can set these servers in a preferable order, which is called the server group list. When a user tries to access the switch, the switch will ask the first server in the server group list for authentication. If no response is received, the second server will be queried, and so on. The switch has two built-in authentication server group, one for RADIUS and the other for TACACS+. These two server groups cannot be deleted, and the user-defined RADIUS/TACACS+ server will join these two server groups automatically. 12.6.1 Global Config This page is used to enable/disable the AAA function globally. Choose the menu Network Security→AAA→Global Conifg to load the following page. Figure 12-24 AAA Global Config  Configuration Procedure Click Enable to enable the AAA function globally. 12.6.2 Privilege Elevation This page is used to elevate the current logged-in user from guest to admin and gain administrator level privileges. The authentication password is possibly authenticated in RADIUS/TACACS+ servers, user-defined server groups or local on the switch. Choose the menu Network Security→AAA→Global Conifg to load the following page. Figure 12-25 Privilege Elevate  Configuration Procedure Enter the Enable Password and click Enable button to elevate the current logged-in user from guest to admin. Only admin users can configure the following AAA settings. 170

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

170
local switch denies the user’s access, the authentication process stops and no other
authentication methods are attempted.
802.1X Authentication
802.1X protocol uses the RADIUS to provide detailed accounting information and flexible
administrative control over authentication process. The Dot1x List feature defines the RADIUS
server groups in the 802.1X authentication.
RADIUS/TACACS+ Server
Users can configure the RADIUS/TACACS+ servers for the connection between the switch and
the server.
Server Group
Users can define the authentication server group with up to several servers running the same
secure protocols, either RADIUS or TACACS+. Users can set these servers in a preferable order,
which is called the server group list. When a user tries to access the switch, the switch will ask the
first server in the server group list for authentication. If no response is received, the second server
will be queried, and so on.
The switch has two built-in authentication server group, one for RADIUS and the other for
TACACS+. These two server groups cannot be deleted, and the user-defined RADIUS/TACACS+
server will join these two server groups automatically.
12.6.1
Global Config
This page is used to enable/disable the AAA function globally.
Choose the menu
Network Security
AAA
Global Conifg
to load the following page.
Figure 12-24 AAA Global Config
Configuration Procedure
Click Enable to enable the AAA function globally.
12.6.2
Privilege Elevation
This page is used to elevate the current logged-in user from guest to admin and gain administrator
level privileges. The authentication password is possibly authenticated in RADIUS/TACACS+
servers, user-defined server groups or local on the switch.
Choose the menu
Network Security
AAA
Global Conifg
to load the following page.
Figure 12-25 Privilege Elevate
Configuration Procedure
Enter the Enable Password and click Enable button to elevate the current logged-in user from
guest to admin. Only admin users can configure the following AAA settings.