Authentication List Summary
Use the Authentication List Summary page to view and configure the authentication lists used for management access and port-based (IEEE 802.1X) access to the system. An authentication list specifies which authentication method(s) to use to validate the credentials of a user who attempts to access the device. Several authentication lists are preconfigured on the system. These are default lists, and they cannot be deleted. Additionally, the List Name and Access Type settings for the default lists cannot be changed.
To access this page, click
in the navigation menu.Authentication List Summary Fields shows the fields for the Authentication List Summary page.
Authentication List Summary Fields
Field | Description |
---|---|
List Name | The name of the authentication list. This field can be configured only when adding a new authentication list. |
Access Type | The way the user accesses the system. This field can be configured only when adding a new authentication list, and only the Login and Enable access types can be selected. The access types are as follows:
|
Method Options | The method(s) used to authenticate a user who attempts to access the management interface or network. The possible methods are as follows:
|
List Type | The type of list, which is one of the following:
|
Access Line | The access method(s) that use the list for authentication. The settings for this field are configured on the Authentication Selection page. |
- Click Refresh to update the information on the screen.
- To create a new authentication list, see Authentication Server Users. To assign users to a specific authentication list, see User Accounts. To configure the 802.1x port security users, see RADIUS Settings.