Software User Manual
D-Link Unified Access System
12/10/09
Document
34CSFP6XXUWS-SWUM100-D7
Authentication List Summary
Page 75
A
UTHENTICATION
L
IST
S
UMMARY
Use the
Authentication List Summary
page to view information about the authentication lists on the system and which
users are associated with each list. The page also displays information about 802.1X port security users.
To access the Authentication List Summary page, click
LAN > Monitoring > Authentication List Summary
in the
navigation tree.
Figure 23: Login Session
The
Authentication List Summary
page has the following read-only fields:
•
Click
Refresh
to update the information on the screen.
•
To assign users to a specific authentication list, see
. To configure the 802.1X port security
users, see
“Port Access Control” on page 383
Table 16: Login Fields
Field
Description
Authentication List
Identifies the name of the authentication login list summarized in this row.
Method List
Shows the order of the login methods configured for the list.
Login Users
Shows the users assigned to this login list on the User Login Configuration screen.
This list is used to authenticate the users for system login access.
802.1X Port Security Users
Shows the port access control users assigned to this login list. This list is used to
authenticate the users for port access by using the IEEE 802.1X protocol.