Netgear S3300-28X (GS728TX) - ProSAFE S3300 Smart Switch Series 관리자 가이드

다운로드
페이지 346
Managing Device Security 
223
 S3300 Smart Switch
Authentication List Configuration
Use the Authentication List screen to configure the default login list. A login list specifies one 
or more authentication methods to validate switch or port access for the admin user.
Note:
Admin is the only user on the system and is assigned to a 
preconfigured list named defaultList, which you cannot delete.
HTTP Authentication List
Use the HTTP Authentication List to configure the default HTTP login list.
To change the HTTP authentication method for the defaultList:
1. 
Select Security 
 Management Security > Authentication List > HTTP Authentication 
List.
2. 
Select the check box next to the httpList name.
3. 
From the list in the 1 column, select the authentication method that should appear first in the 
selected authentication login list. 
If you select a method that does not time out as the first method, such as Local, no other 
method will be tried, even if you have specified more than one method. User 
authentication occurs in the order the methods are selected. Possible methods are as 
follows:
Local. The user’s locally stored ID and password will be used for authentication. 
Since the local method does not time out, if you select this option as the first method, 
no other method will be tried, even if you have specified more than one method.
RADIUS. The user’s ID and password will be authenticated using the RADIUS server. 
If you select RADIUS or TACACS+ as the first method and an error occurs during the 
authentication, the switch uses Method 2 to authenticate the user.
TACACS+. The user’s ID and password will be authenticated using the TACACS+ 
server. If you select RADIUS or TACACS+ as the first method and an error occurs 
during the authentication, the switch attempts user authentication Method 2.
None. The authentication method is unspecified. This option is available only for 
Method 2 and Method 3.
4. 
From the list in the 2 column, select the authentication method, if any, that should appear 
second in the selected authentication login list. 
This is the method that is used if the first method times out. If you select a method that 
does not time out as the second method, the third method is not tried. 
5. 
From the list in the 3 column, select the authentication method, if any, that should appear 
third in the selected authentication login list. 
6. 
From the list in the 4 column, select the method, if any, that should appear fourth in the 
selected authentication login list. 
This is the method that will be used if all previous methods time out.