142
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
CHAPTER 10: SECURITY
PARAMETER DESCRIPTION
Group Name: The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP,
STP or QoS), but a few of them contain more than one. The following description defines these privilege level groups in detail:
System: Contact, Name, Location, Timezone, Daylight Saving Time, Log.
Privilege Levels: Every group has an authorization Privilege level for the following sub groups: configuration read-only, configuration/
execute read-write. User Privilege should be same or greater than the authorization Privilege level to have the access to that group.
Buttons
Apply: Click to save changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
10.1.3 AUTH METHOD
This page shows how to configure a user with auth method when he logs into the switch via one of the management client
interfaces.
WEB INTERFACE
To configure an Auth Method Configuration in the web interface:
1. Click Security, Management and Auth Method.
2. Specify the Client (console, telent, ssh, web) that you want to monitor.
3. Specify the Methods (none, local, radius, tacacs), Service port, Cmd Lvl, Cfg Cmd, Fallback, Exec.
4. Click Apply.
FIGURE 10-3. AUTH METHOD CONFIGURATION