![Ubiquiti ES-24-250W Administration Manual Download Page 44](http://html2.mh-extra.com/html/ubiquiti/es-24-250w/es-24-250w_administration-manual_3227362044.webp)
43
Configuring System Information
EdgeSwitch
™
Administration Guide
Ubiquiti Networks, Inc.
The following table shows the fields for the
Authentication List Configuration
page.
Authentication List Configuration Fields
Field
Description
List Name
The name of the authentication list. This field can be configured only when adding a new
authentication list.
Access Type
How the user accesses the system. This field can be configured only when a new authentication list is
added, and only the Login and Enable access types can be selected. The access types are as follows:
•
Login
User EXEC-level management access to the command-line interface (CLI) using a Telnet
or SSH session. Access at this level has a limited number of CLI commands available to view or
configure the system.
•
Enable
Privileged EXEC-level management access to the CLI using a Telnet or SSH session. In
Privileged EXEC mode, read-write users have access to all CLI commands.
•
HTTP
Management-level access to the web-based user interface using HTTP.
•
HTTPS
Management-level access to the web-based user interface using secure HTTP.
•
Dot1x
Port-based access to the network through a switch port that is controlled by IEEE 802.1X.
Method Options
The method(s) used to authenticate a user who attempts to access the management interface or
network. The possible methods are as follows:
•
Enable
Uses the locally configured Enable password to verify the user’s credentials.
•
Local
Uses the ID and password in the Local User database to verify the user’s credentials.
•
RADIUS
Sends the user’s ID and password to the configured RADIUS server to verify the user’s
credentials.
•
Sends the user’s ID and password to the configured server to verify the user’s
credentials.
•
None
No authentication is used.
•
IAS
Uses the local Internal Authentication Server (IAS) database for 802.1X port-based
authentication.
List Type
The type of list, which is one of the following:
•
Default
The list is preconfigured on the system. This type of list cannot be deleted, and only the
Method Options
are configurable.
•
Configured
The list has been added by a user.
Access Line
The access method(s) that use the list for authentication. The settings for this field are configured on
the
Authentication Selection
page.
Authentication Methods
– This section of the
Add New Authentication List
dialog box contains the fields that you use to configure the
authentication methods for the authentication list.
Available Methods
The authentication methods that can be used for the authentication list.
To set the authentication method, select the method from the
Available Methods
field and click
to
move it to the
Selected Methods
field.
Selected Methods
The authentication methods currently configured for the list. If this field lists multiple methods, the
methods are applied in the order listed – if user authentication fails using the first method, the device
tries again using the second method, and so on. If the current method is
None
, no authentication is
performed (user is granted unconditional access); therefore,
None must be the last method in the list.
To remove a method from the list, select it and click
to return it to the
Available Methods
field.
Use the buttons to perform the following tasks:
• To configure a new authentication list, click
Add
, configure the settings in the
Add New Authentication List
dialog box, and click
Submit
to apply the settings to the switch.
• To edit a list, select the list’s entry, click
Edit
, configure the settings in the
Edit Authentication List
dialog
box, and click
Submit
to apply the settings to the switch. Available settings depend on the list type.
• To remove a non-default authentication list, click the entry’s button and confirm the action.
• To reset the
Method Options
for a default authentication list to the factory default values, click the entry’s
button and confirm the action.
• Click
Refresh
to update the information on the screen.
To retain the changes across the switch’s next power cycle, click
System
>
Configuration Storage
>
Save
.
To create a new authentication list, see
“Authentication Server Users” on page 37
. To assign users to a
specific authentication list, see
“User Accounts” on page 35
. To configure the 802.1X port security users,
see
“RADIUS Settings” on page 218
.