Table 41: Select Authentication List Fields (continued)
Field
Description
Access Type
The way the user accesses the system. This field can be configured only when
adding a new authentication list, and only the Login and Enable access types can
be selected. The access types are as follows:
•
Login – User EXEC-level management access to the command-line interface
(CLI) by using a console connection or a telnet or SSH session. Access at this
level has a limited number of CLI commands available to view or configure
the system.
•
Enable – Privileged EXEC-level management access to the CLI by using a
console connection or a telnet or SSH session. In Privileged EXEC mode,
read-write users have access to all CLI commands.
•
HTTP – Management-level access to the web-based user interface by using
HTTP.
•
HTTPS – Management-level access to the web-based user interface by using
secure HTTP.
•
Dot1x – Port-based access to the network through a switch port that is
controlled by IEEE 802.1X.
Method Options
The method(s) used to authenticate a user who attempts to access the
management interface or network. The possible methods are as follows:
•
Enable – Uses the locally configured Enable password to verify the user's
credentials.
•
Line – Uses the locally configured Line password to verify the user's
credentials.
•
Local – Uses the ID and password in the Local User database to verify the
user's credentials.
•
RADIUS – Sends the user's ID and password to the configured
server
to verify the user's credentials.
•
– Sends the user's ID and password to the configured
server to verify the user's credentials.
•
None – No authentication is used.
•
IAS – Uses the local Internal Authentication Server (IAS) database for 802.1X
port-based authentication.
List Type
The type of list, which is one of the following:
•
Default – The list is preconfigured on the system. This type of list cannot be
deleted, and only the Method Options are configurable.
•
Configured – The list has been added by a user.
Access Line
The access method(s) that use the list for authentication. The settings for this
field are configured on the Authentication Selection page.
If you change any of the parameters, click
Submit
to apply the changes to the system. If you want the
switch to retain the new values across a power cycle, you must save the configuration.
Authorization List Configuration
Use the Authorization List Configuration page to view and configure the authorization lists for users
who access the CLI and for users who access the network through IEEE 802.1X-enabled ports.
Authorization lists are used to determine whether a user is permitted to perform a given activity on the
Configuring System Information
ExtremeSwitching 200 Series: Administration Guide
67