Authentication Method List
A method list describes the authentication methods and their sequence to authenticate a user.
The switch supports Login List for users to gain access to the switch, and Enable List for
normal users to gain administrative privileges.
The administrator can set the authentication methods in a preferable order in the list. The
switch uses the first method listed to authenticate users, if that method fails to respond, the
switch selects the next authentication method in the method list. This process continues until
there is a successful communication with a listed authentication method or until all defined
methods are exhausted. If authentication fails at any point in this circle, which means the
secure server or the local switch denies the user’s access, the authentication process stops
and no other authentication methods are attempted.
802.1X Authentication
802.1X protocol uses the RADIUS to provide detailed accounting information and flexible
administrative control over authentication process. The Dot1x List feature defines the RADIUS
server groups in the 802.1X authentication.
RADIUS/ Server
User can configure the RADIUS/ servers for the connection between the switch and
the server.
14.7.1
RADIUS Server Config
This page is used to configure the authentication servers running the RADIUS security
protocols.
Choose the menu
Network Security
→
AAA
→
RADIUS Conifg
to load the following page.
Configuration Procedure:
Configure the RADIUS server’s IP and other relevant parameters under the Server Config.
View, edit and delete the configured RADIUS servers in the Server List.
360
Содержание T3700G-28TQ
Страница 1: ...User Guide T3700G 28TQ T3700G 52TQ 1910012358 REV3 0 0 November 2018...
Страница 11: ...XI...