Authentication Method List
A method list describes the authentication methods and their sequence to authenticate a user.
The switch supports Login List for users to gain access to the switch, and Enable List for
normal users to gain administrative privileges.
The administrator can set the authentication methods in a preferable order in the list. The
switch uses the first method listed to authenticate users, if that method fails to respond, the
switch selects the next authentication method in the method list. This process continues until
there is a successful communication with a listed authentication method or until all defined
methods are exhausted. If authentication fails at any point in this circle, which means the
secure server or the local switch denies the user’s access, the authentication process stops
and no other authentication methods are attempted.
802.1X Authentication
802.1X protocol uses the RADIUS to provide detailed accounting information and flexible
administrative control over authentication process. The Dot1x List feature defines the RADIUS
server groups in the 802.1X authentication.
RADIUS/ Server
User can configure the RADIUS/ servers for the connection between the switch and
the server.
14.7.1
RADIUS Server Config
This page is used to configure the authentication servers running the RADIUS security
protocols.
Choose the menu
Network Security
→
AAA
→
RADIUS Conifg
to load the following page.
Configuration Procedure:
Configure the RADIUS server’s IP and other relevant parameters under the Server Config.
View, edit and delete the configured RADIUS servers in the Server List.
360