EasyManuals Logo

D-Link xStack DES-3200 Series User Manual

D-Link xStack DES-3200 Series
531 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #266 background imageLoading...
Page #266 background image
xStack® DES-3200 Series Layer 2 Ethernet Managed Switch CLI Reference Manual
26
1
delete authen_login method_list_name
This
command is used to delete a list for authentication methods for
user login.
Description
Parameters
<string 15> Enter an alphanumeric string of up to 15 characters to
define the given method list to delete.
Only Administrator-level users
can issue this command.
Restrictions
Example usage:
To delete the method list name “Zira”:
DES-3200-28:4#delete authen_login method_list_name Zira
Command: delete authen_login method_list_name Zira
Success.
DES-3200-28:4#
show authen_login
Used to displ
ay a previously configured user defined method list of
authentication methods for users logging on to the Switch.
Purpose
sho
w authen_login [default | method_list_name <string 15> | all]
Syntax
This
command is used to show a list of authentication methods for
user login.
Description
default – Entering thi
s parameter will display the default method list
for users logging on to the Switch.
Parameters
method_list_name <string 15> Enter an alphanumeric string of up to
15 characters to define the given method list to view.
all – Entering this parameter will display all the authentication login
methods currently configured on the Switch.
The window will display the following parameters:
Method List Name – The name of a previously configured method list
name.
Priority – Defines which order the method list protocols will be queried
for authentication when a user attempts to log on to the Switch.
Priority ranges from 1(highest) to 4 (lowest).
Method Name – Defines which security protocols are implemented,
per method list name.
Comment – Defines the type of Method. User-defined Group refers to
server group defined by the user. Built-in Group refers to the
TACACS, XTACACS, TACACS+ and RADIUS security protocols
which are permanently set in the Switch. Keyword refers to
authentication using a technique INSTEAD of TACACS / XTACACS /
TACACS+ / RADIUS which are local (authentication through the user
account on the Switch) and none (no authentication necessary to
access any function on the Switch).
Non
e.
Restrictions
Example usage:
To view the authentication login method list named Zira:

Table of Contents

Other manuals for D-Link xStack DES-3200 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DES-3200 Series and is the answer not in the manual?

D-Link xStack DES-3200 Series Specifications

General IconGeneral
ManagedYes
LayerLayer 2
MAC Address Table Size8K
Quality of Service (QoS)802.1p
Security FeaturesACL, 802.1X, Port Security
Jumbo Frame SupportUp to 9KB
DimensionsVaries by model
WeightVaries by model
Operating Temperature0°C to 40°C
Storage Temperature-40°C to 70°C
Standards ComplianceIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3x, IEEE 802.1D, IEEE 802.1w, IEEE 802.1s, IEEE 802.1Q, IEEE 802.1p
Forwarding Rate13.1 Mpps (48-port)

Related product manuals