xStack® DGS-3620 Series Managed Switch Web UI Reference Guide
378
radius
- Adding this parameter will require the user to be authenticated using the
RADIUS protocol from a remote RADIUS server.
local
- Adding this parameter will require the user to be authenticated using the local
user account database on the Switch.
none
- Adding this parameter will require no authentication needed to access the
Switch.
Click the
Apply
button to accept the changes made.
Click the
Edit
button to re-configure the specific entry.
Click the
Delete
button to remove the specific entry.
Enable Method Lists Settings
Users can set up Method Lists to promote users with user level privileges to Administrator (Admin) level privileges
using authentication methods on the Switch. Once a user acquires normal user level privileges on the Switch, he or
she must be authenticated by a method on the Switch to gain administrator privileges on the Switch, which is
defined by the Administrator. A maximum of eight Enable Method Lists can be implemented on the Switch, one of
which is a default Enable Method List. This default Enable Method List cannot be deleted but can be configured.
The sequence of methods implemented in this command will affect the authentication result. For example, if a user
enters a sequence of methods like TACACS - XTACACS - Local Enable, the Switch will send an authentication
request to the first TACACS host in the server group. If no verification is found, the Switch will send an
authentication request to the second TACACS host in the server group and so on, until the list is exhausted. At that
point, the Switch will restart the same sequence with the following protocol listed, XTACACS. If no authentication
takes place using the XTACACS list, the Local Enable password set in the Switch is used to authenticate the user.
Successful authentication using any of these methods will give the user an "Admin" privilege.
NOTE:
To set the Local Enable Password, see the next section, entitled Local Enable Password.
To view this window, click
Security > Access Authentication Control > Enable method Lists Settings
as shown
below:
Figure 8-71 Enable method Lists Settings window
To delete an Enable Method List defined by the user, click the
Delete
button corresponding to the entry desired to
be deleted. To modify an Enable Method List, click its corresponding
Edit
button.
The fields that can be configured are described below:
Parameter
Description
Method List Name
Enter a method list name defined by the user of up to 15 characters.
Priority 1, 2, 3, 4
The user may add one, or a combination of up to four of the following authentication
Summary of Contents for DGS-3620-28PC-EI
Page 1: ......