– 64 –
C
HAPTER
4
| Configuring the Switch
Configuring Security
Figure 13: Configuring Privilege Levels
C
ONFIGURING
T
HE
A
UTHENTICATION
M
ETHOD
F
OR
M
ANAGEMENT
A
CCESS
Use the Authentication Method Configuration page to specify the
authentication method for controlling management access through the
console, Telnet, SSH or HTTP/HTTPS. Access can be based on the (local)
user name and password configured on the switch, or can be controlled
with a RADIUS or remote access authentication server. Note that
the RADIUS servers used to authenticate client access for IEEE 802.1X port
authentication are also configured on this page (see
page 89
).
Remote Authentication Dial-in User Service (RADIUS) and Terminal Access
Controller Access Control System Plus () are logon authentication
protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An
authentication server contains a database of multiple user name/password
Содержание EX26262
Страница 1: ...Layer 2 Gigabit PoE Ethernet Switch Management Guide...
Страница 2: ......
Страница 3: ...MANAGEMENT GUIDE...
Страница 4: ......
Страница 6: ...6 ABOUT THIS GUIDE...
Страница 18: ...18 FIGURES...
Страница 20: ...20 TABLES...
Страница 22: ...22 SECTION I Getting Started...
Страница 34: ...34 SECTION II Web Configuration...
Страница 46: ...46 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface...
Страница 202: ...CHAPTER 4 Configuring the Switch Quality of Service 202 Figure 83 Configuring Port Tag Remarking Mode...
Страница 290: ...290 CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling...
Страница 294: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 294...
Страница 300: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 300...
Страница 302: ...302 SECTION III Appendices...
Страница 320: ...GLOSSARY 320...
Страница 325: ......
Страница 326: ......