EasyManuals Logo

D-Link xStack DES-3528 Series Reference Guide

D-Link xStack DES-3528 Series
378 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #276 background imageLoading...
Page #276 background image
xStack® DES-3528/DES-3552 Series Layer 2 Managed Stackable Fast Ethernet Switch Web UI Reference Guide
269
Figure 8-64 Authentication Server Settings window
The fields that can be configured are described below:
Parameter Description
IP Address
The IP address of the remote server host to add.
Protocol
The protocol used by the server host. The user may choose one of the following:
TACACS - Enter this parameter if the server host utilizes the TACACS protocol.
XTACACS - Enter this parameter if the server host utilizes the XTACACS protocol.
TACACS+ - Enter this parameter if the server host utilizes the TACACS+ protocol.
RADIUS - Enter this parameter if the server host utilizes the RADIUS protocol.
Key (Max: 254
characters)
Authentication key to be shared with a configured TACACS+ or RADIUS servers only.
Specify an alphanumeric string up to 254 characters.
Port (1-65535) Enter a number between 1 and 65535 to define the virtual port number of the
authentication protocol on a server host. The default port number is 49 for
TACACS/XTACACS/TACACS+ servers and 1813 for RADIUS servers but the user
may set a unique port number for higher security.
Timeout (1-255)
Enter the time in seconds the Switch will wait for the server host to reply to an
authentication request. The default value is 5 seconds.
Retransmit (1-20)
Enter the value in the retransmit field to change how many times the device will resend
an authentication request when the TACACS server does not respond.
Click the Apply button to accept the changes made.
NOTE: More than one authentication protocol can be run on the same physical server host but,
remember that TACACS/XTACACS/TACACS+ are separate entities and are not compatible
with each other.
Login Method Lists Settings
User-defined or default Login Method List of authentication techniques can be configured for users logging on to
the Switch. The sequence of techniques implemented in this command will affect the authentication result. For
example, if a user enters a sequence of techniques, for example TACACS - XTACACS- local, the Switch will send
an authentication request to the first TACACS host in the server group. If no response comes from the server host,
the Switch will send an authentication request to the second TACACS host in the server group and so on, until the
list is exhausted. At that point, the Switch will restart the same sequence with the following protocol listed,
XTACACS. If no authentication takes place using the XTACACS list, the local account database set in the Switch is
used to authenticate the user. When the local method is used, the privilege level will be dependent on the local
account privilege configured on the Switch.

Table of Contents

Other manuals for D-Link xStack DES-3528 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DES-3528 Series and is the answer not in the manual?

D-Link xStack DES-3528 Series Specifications

General IconGeneral
BrandD-Link
ModelxStack DES-3528 Series
CategorySwitch
LanguageEnglish

Related product manuals