TP-Link T1500G-8T T1500G-10PSUN V1 User Guide - Page 192

Application Authentication List Config

Page 192 highlights

View and delete the configured method priority list in the Authentication Login Method List and Authentication Enable Method List. .  Entry Description Method List Name: List Type: Pri1, Pri2, Pri3, Pri4: Define a method list name. Specify the authentication type as Login or Enable. Login stands for the Authentication Login Method List, and Enable stands for the Authentication Enable Method list. Specify the authentication methods in order. The next authentication method is tried only if the previous method does not respond, not if it fails. local: Use the local database in the switch for authentication. none: No authentication is used. radius: Use the remote RADIUS server/server groups for authentication. tacacs: Use the remote TACACS+ server/server groups for authentication. user-defined server group: Use the user-defined server groups for authentication. Tips: If the Enable password is verified on the remote RADIUS server, the switch will send the Enable authentication with the default username as $enable$. 12.6.7 Application Authentication List Config Users can configure authentication method lists on the following access applications: console, telnet, ssh and http. Choose the menu Network Security→AAA→Global Config to load the following page. Figure 12-31 Application Authentication Settings  Configuration Procedure 1) Select the application module. 2) Configure the authentication method list from the Login List drop-down menu. This option defines the authentication method for users accessing the switch. 182

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

View and delete the configured method priority list in the Authentication Login Method List and
Authentication Enable Method List. .
Entry Description
Method List
Name:
Define a method list name.
List Type:
Specify the authentication type as Login or Enable. Login stands
for the Authentication Login Method List, and Enable stands for
the Authentication Enable Method list.
Pri1, Pri2, Pri3,
Pri4:
Specify
the
authentication
methods
in
order.
The
next
authentication method is tried only if the previous method does
not respond, not if it fails.
local: Use the local database in the switch for authentication.
none: No authentication is used.
radius:
Use
the
remote
RADIUS server/server
groups
for
authentication.
tacacs: Use the remote TACACS+ server/server groups for
authentication.
user-defined server group: Use the user-defined server groups
for authentication.
Tips:
If the Enable password is verified on the remote RADIUS server, the switch will send the Enable
authentication with the default username as $enable$.
12.6.7
Application Authentication List Config
Users can configure authentication method lists on the following access applications: console,
telnet, ssh and http.
Choose the menu
Network Security
AAA
Global Config
to load the following page.
Figure 12-31 Application Authentication Settings
Configuration Procedure
1)
Select the application module.
2)
Configure the authentication method list from the Login List drop-down menu. This option
defines the authentication method for users accessing the switch.
182