Login Method Lists Settings - D-Link DGS-3620-28PC-SI Product Manual

Product manual
Table of Contents

Advertisement

xStack® DGS-3620 Series Managed Switch Web UI Reference Guide
Retransmit (1-20)
Click the Apply button to accept the changes made.
NOTE: More than one authentication protocol can be run on the same physical server host but,
remember that TACACS/XTACACS/TACACS+ are separate entities and are not compatible
with each other.

Login Method Lists Settings

User-defined or default Login Method List of authentication techniques can be configured for users logging on to
the Switch. The sequence of techniques implemented in this command will affect the authentication result. For
example, if a user enters a sequence of techniques, for example TACACS - XTACACS- local, the Switch will send
an authentication request to the first TACACS host in the server group. If no response comes from the server host,
the Switch will send an authentication request to the second TACACS host in the server group and so on, until the
list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed,
XTACACS. If no authentication takes place using the XTACACS list, the local account database set in the Switch is
used to authenticate the user. When the local method is used, the privilege level will be dependent on the local
account privilege configured on the Switch.
Successful login using any of these techniques will give the user a "User" privilege only. If the user wishes to
upgrade his or her status to the administrator level, the user must use the Enable Admin window, in which the user
must enter a previously configured password, set by the administrator.
To view this window, click Security > Access Authentication Control > Login Method Lists Settings as shown
below:
The Switch contains one Method List that is set and cannot be removed, yet can be modified. To delete a Login
Method List defined by the user, click the Delete button corresponding to the entry desired to be deleted. To modify
a Login Method List, click its corresponding Edit button.
The fields that can be configured are described below:
Parameter
Method List Name
Priority 1, 2, 3, 4
authentication request. The default value is 5 seconds.
Enter the value in the retransmit field to change how many times the device will
resend an authentication request when the TACACS server does not respond.
Figure 8-70 Login Method Lists Settings window
Description
Enter a method list name defined by the user of up to 15 characters.
The user may add one, or a combination of up to four of the following authentication
methods to this method list:
tacacs - Adding this parameter will require the user to be authenticated using the
TACACS protocol from a remote TACACS server.
xtacacs - Adding this parameter will require the user to be authenticated using the
XTACACS protocol from a remote XTACACS server.
tacacs+ - Adding this parameter will require the user to be authenticated using the
TACACS+ protocol from a remote TACACS+ server.
377

Advertisement

Table of Contents
loading

Table of Contents