Transition Networks
S4224 Web User Guide
33558 Rev. C
Page 55 of 669
Authentication Method Configuration
Configuration > Security > Switch >
Auth Method
The authentication section allows you to configure how a user is authenticated when he logs into the
switch via one of the management client interfaces.
Access this page from the
Configuration
>
Security
>
Switch
>
Auth Method
menu path.
Authentication Method Configuration
The authentication section allows you to configure how a user is authenticated when he logs into the
switch via one of the management client interfaces. The table has one row for each client type and a
number of columns, which are:
Client
The management client for which the configuration below applies (console, telnet, ssh, or http).
Methods
Method can be set to one of the following values:
no
: Authentication is disabled and login is not possible.
local
: Use the local user database on the switch for authentication.
radius
: Use remote RADIUS server(s) for authentication.
R
emote
A
uthentication
D
ial
I
n
U
ser
S
ervice is a networking protocol that provides
centralized access, authorization and accounting management for people or computers to connect and
use a network service.
tacacs
: Use remote server(s) for authentication.
T
erminal
A
ccess
C
ontroller
A
ccess
C
ontrol
S
ystem
P
lus. It is a networking protocol which provides access control for routers, network access
servers and other networked computing devices via one or more centralized servers. provides
separate authentication, authorization and accounting services.