...
This article describes how access management via RADIUS (802.1x) can be implemented on a switch of the GS-3xxx series switch. This makes it possible to centrally manage user access data.
...
- Hostname: Enter the IP address or DNS name of the RADIUS server to be used for authentication when logging on.
- Key: Enter a password that the switch uses to authenticate itself at with the RADIUS server.
1.3) Switch to the menu Security → Management → Auth Method.
...
Info |
---|
If HTTPS is active, the redirect option automatically redirects HTTP to HTTPS. |
1.5 If HTTPS is active, the redirect option automatically redirects HTTP to HTTPS) Click the disk icon in the top right-hand corner to save the configuration as the start configuration.
Info |
---|
The start configuration is retained even if the device is restarted or there is a power failure. |
...
- Name / MAC address: Enter a username to be used by the user to access the switch.
- Password: Enter a password that the user should use to access the switch.
- Protocol restriction for authentication: Uncheck all options except PAP. This is practical because the GS-3xxx series switches only support PAP.
- Shell privilege level: Set the value to 15 so that the user receives write permissions for all function groups.
- Expiry type: From the drop-down menu, select Never so that the entry remains valid permanently.
Info |
---|
The shell The Shell privilege level can be set from 1 – 15, where the value 15 represents the highest priority. The switch provides the option to assign different privilege levels to individual function groups in the menu Security → Management → Privilege Level. This allows different permissions to be assigned to different users. |
...