Authentication List Summary
D-Link Unified Wired and Wireless Access System
Oct. 2015 Page 85
D-Link UWS User Manual
The same fields are displayed in case of Enable Authentication List Table and the Authentication Lists and
Authentication Methods configured for each List of Console, Telnet, SSH, HTTPS, HTTP and DOT1X are
displayed respectively.
• Click Refresh to update the information on the screen.
• To assign users to a specific authentication list, see “User Login” on page 87. To configure the 802.1X port
security users, see “Port Access Control” on page 381.