Authentication List Summary; Figure 23: Login Session; Table 16: Login Fields - D-Link DWS-4026 User Manual

Dws-4000 series unified wired & wireless access system
Table of Contents

Advertisement

Software User Manual
12/10/09
A
UTHENTICATION
Use the Authentication List Summary page to view information about the authentication lists on the system and which
users are associated with each list. The page also displays information about 802.1X port security users.
To access the Authentication List Summary page, click LAN > Monitoring > Authentication List Summary in the
navigation tree.
The Authentication List Summary page has the following read-only fields:
Field
Authentication List
Method List
Login Users
802.1X Port Security Users
Click Refresh to update the information on the screen.
To assign users to a specific authentication list, see
users, see
"Port Access Control" on page
Document
34CSFP6XXUWS-SWUM100-D7
L
S
IST
UMMARY

Figure 23: Login Session

Table 16: Login Fields

Description
Identifies the name of the authentication login list summarized in this row.
Shows the order of the login methods configured for the list.
Shows the users assigned to this login list on the User Login Configuration screen.
This list is used to authenticate the users for system login access.
Shows the port access control users assigned to this login list. This list is used to
authenticate the users for port access by using the IEEE 802.1X protocol.
383.
D-Link Unified Access System
"User Login" on page
77. To configure the 802.1X port security

Authentication List Summary

Page 75

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8600apDws-4000 series

Table of Contents