TP-Link T1500G-10MPS T1500G-10MPSUN V1 User Guide - Page 182

Authentication Method List Config

Page 182 highlights

Figure 12-29 Add Server to Server Group  Configuration Procedure 1) Configure the Server Group name and Server Type to create a server group. 2) Click edit in the Server Group List to configure the corresponding server group. 3) Select Server IP you have previously created and click add to add the server to the server group. (Figure 12-29) View and delete the configured server groups in the Server Group list. View and delete the configured servers in the server IP list.  Entry Description Server Group: Server Type: Server IP Define a server group with a group name. Specify the server type as RADIUS or TACACS+. Select the IP of the server you have previously configured. Note: 1. The two built-in server groups radius and tacacs+ cannot be deleted or edited. 2. Up to 16 servers can be added to one server group. 12.6.6 Authentication Method List Config Before you configure AAA authentication on a certain application, you should define an authentication method list first. An authentication method list describes the sequence and authentication method to be queried to authenticate a user. The switch uses the first method listed to authenticate users, if that method fails to respond, the switch selects the next authentication method in the method list. This process continues until there is a successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this circle, which means the secure server or the local switch denies the user's access, the authentication process stops and no other authentication methods are attempted. For example, if a user defines an authentication login method list as tacacs-radius-local, the switch will send an authentication request to the fist TACACS+ server in the tacacs server group. If there is no response, the switch will send an authentication request to the second TACACS+ server in the tacacs server group and so on, until the tacacs server group list is exhausted. Then the RADIUS server group will be queried. If no authentication is accomplished in the RADIUS server list, the switch will authenticate the user locally. This forms a backup system for authentication. 173

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

173
Figure 12-29 Add Server to Server Group
Configuration Procedure
1) Configure the Server Group name and Server Type to create a server group.
2) Click edit in the Server Group List to configure the corresponding server group.
3) Select Server IP you have previously created and click add to add the server to the server
group. (Figure 12-29)
View and delete the configured server groups in the Server Group list.
View and delete the configured servers in the server IP list.
Entry Description
Server Group:
Define a server group with a group name.
Server Type:
Specify the server type as RADIUS or TACACS+.
Server IP
Select the IP of the server you have previously configured.
Note:
1.
The two built-in server groups radius and tacacs+ cannot be deleted or edited.
2.
Up to 16 servers can be added to one server group.
12.6.6
Authentication Method List Config
Before you configure AAA authentication on a certain application, you should define an
authentication method list first. An authentication method list describes the sequence and
authentication method to be queried to authenticate a user.
The switch uses the first method listed to authenticate users, if that method fails to respond, the
switch selects the next authentication method in the method list. This process continues until there
is a successful communication with a listed authentication method or until all defined methods are
exhausted. If authentication fails at any point in this circle, which means the secure server or the
local switch denies the user’s access, the authentication process stops and no other
authentication methods are attempted.
For example, if a user defines an authentication login method list as tacacs-radius-local, the switch
will send an authentication request to the fist TACACS+ server in the tacacs server group. If there
is no response, the switch will send an authentication request to the second TACACS+ server in
the tacacs server group and so on, until the tacacs server group list is exhausted. Then the
RADIUS server group will be queried. If no authentication is accomplished in the RADIUS server
list, the switch will authenticate the user locally. This forms a backup system for authentication.