Dell 4161DS Switch User Manual


 
181 LDAP Feature for the Remote Console Switch
This model provides an Administrator maximum flexibility over the different
combinations of users, privileges, and SIPs on the Remote Console Switch
without adding too much complexity.
Before installing the Dell Schema Extensions, Administrators should read
through the descriptions and instructions within this chapter to determine
which schema is right for their particular installation. Altering a schema
object will cause it to propagate through Active Directory so that once it is
created, it cannot be deleted. It can only be deactivated. Because of this, the
benefits of changing the schema should be carefully weighed before the effort
is undertaken.
The primary benefit gained by installing the Dell Schema Extensions is to
eliminate confusion. When using the standard Active Directory schema, a
Remote Console Switch most closely matches a computer device object and
is configured as one. Since the Remote Console Switch is not a computer, the
schema functions will not all apply. Care will have to be taken to correctly
configure a Remote Console Switch that is designated in this manner.
In addition, using the Dell Schema Extensions makes it easier to search on
and identify switch devices. A switch that is configured using a computer
device object will be searched on along with every computer device within the
Active Directory structure.
The Remote Console Switch can authenticate equally well using either
schema and no functionality is lost by using either method. Administrators
are free to choose whichever method works within their particular
installation. Instructions have been provided for installations with and
without the Dell Schema extensions. Sections and instructions that pertain
to only one schema set will be marked as such and may be ignored in
installations where they are not used.
Standard Installation
Before a Dell Remote Console switch can use Active Directory for
authentication:
1
Configure the Override Admin Account
2
Configure DNS Settings
3
Set the Network Time Protocol
4
Configure the Authentication Parameters