TP-Link T2500-28TCTL-SL5428E T2500-28TCUN V1 User Guide - Page 244

Authentication Method List Config, Network Security, Authentication List

Page 244 highlights

Note: 1. The two built-in server groups radius and tacacs cannot be deleted or edited. 2. Up to 16 servers can be added to one server group. 13.7.6 Authentication Method List Config Before you configure AAA authentication on a certain application, you should define an authentication method list first. An authentication method list describes the sequence and authentication method to be queried to authenticate a user. The switch uses the first method listed to authenticate users, if that method fails to respond, the switch selects the next authentication method in the method list. This process continues until there is a successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this circle, which means the secure server or the local switch denies the user's access, the authentication process stops and no other authentication methods are attempted. For example, if a user defines an authentication login method list as tacacs-radius-local, the switch will send an authentication request to the fist TACACS+ server in the tacacs server group. If there is no response, the switch will send an authentication request to the second TACACS+ server in the tacacs server group and so on, until the tacacs server group list is exhausted. Then the RADIUS server group will be queried. If no authentication is accomplished in the RADIUS server list, the switch will authenticate the user locally. This forms a backup system for authentication. Choose the menu Network Security→AAA→Authentication List to load the following page. Figure 13-7 Authentication Method List Config  Configuration Procedure: 1) Enter the method list name. 2) Specify the authentication type as Login or Enable. 234

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316

234
Note:
1.
The two built-in server groups radius and tacacs cannot be deleted or edited.
2.
Up to 16 servers can be added to one server group.
13.7.6 Authentication Method List Config
Before you configure AAA authentication on a certain application, you should define an
authentication method list first. An authentication method list describes the sequence and
authentication method to be queried to authenticate a user.
The switch uses the first method listed to authenticate users, if that method fails to respond, the
switch selects the next authentication method in the method list. This process continues until there
is a successful communication with a listed authentication method or until all defined methods are
exhausted. If authentication fails at any point in this circle, which means the secure server or the
local switch denies the user’s access, the authentication process stops and no other
authentication methods are attempted.
For example, if a user defines an authentication login method list as tacacs-radius-local, the switch
will send an authentication request to the fist TACACS+ server in the tacacs server group. If there
is no response, the switch will send an authentication request to the second TACACS+ server in
the tacacs server group and so on, until the tacacs server group list is exhausted. Then the
RADIUS server group will be queried. If no authentication is accomplished in the RADIUS server
list, the switch will authenticate the user locally. This forms a backup system for authentication.
Choose the menu
Network Security
AAA
Authentication List
to load the following page.
Figure 13-7 Authentication Method List Config
Configuration Procedure:
1) Enter the method list name.
2) Specify the authentication type as Login or Enable.