D-Link DSL-G604T Switch User Manual


 
DGS-3024 Gigabit Ethernet Switch Manual
authentication is made, the second server host in the list will be queried, and so on. The built-in Authentication Server
Groups can only have hosts that are running the specified protocol. For example, the TACACS Authentication Server
Groups can only have TACACS Authentication Server Hosts.
The administrator for the Switch may set up six different authentication techniques per user-defined method list (TACACS /
XTACACS / TACACS+ / RADIUS / local / none) for authentication. These techniques will be listed in an order preferable,
and defined by the user for normal user authentication on the Switch, and may contain up to eight authentication techniques.
When a user attempts to access the Switch, the Switch will select the first technique listed for authentication. If the first
technique goes through its Authentication Server Hosts and no authentication is returned, the Switch will then go to the next
technique listed in the server group for authentication, until the authentication has been verified or denied, or the list is
exhausted.
Please note that users granted access to the Switch will be granted normal user privileges on the Switch. To gain access to
administrator level privileges, the user must access the Enable Admin window and then enter a password, which was
previously configured by the administrator of the Switch.
NOTE: TACACS, XTACACS and TACACS+ are separate entities and are
not compatible. The Switch and the server must be configured exactly the
same, using the same protocol. (For example, if the Switch is set up for
TACACS authentication, so must be the host server.)
Authentication Policy & Parameters
This feature will enable an administrator-defined authentication policy for users trying to access the Switch. When enabled,
the device will check the Login Method List and choose a technique for user authentication upon login.
To access the following window, click Security > Access Authentication Control > Policy and Parameters:
Figure 8- 8. Policy & Parameter Settings window
The following parameters can be set:
Parameters Description
Authentication Policy
Use the pull-down menu to enable or disable the Authentication Policy on the
Switch.
Response Timeout (0-
255)
This field will set the time the Switch will wait for a response of authentication from
the user. The user may set a time between 0 and 255 seconds. The default setting
is 30 seconds.
User Attempts (1-255)
This command will configure the maximum number of times the Switch will accept
authentication attempts. Users failing to be authenticated after the set amount of
attempts will be denied access to the Switch and will be locked out of further
authentication attempts. Command line interface users will have to wait 60
seconds before another authentication attempt. Telnet and web users will be
disconnected from the Switch. The user may set the number of attempts from 1 to
255. The default setting is 3.
95