Extended configuration menu – FUJITSU Primergy Blade Server Systems BX600 Benutzerhandbuch

Seite 129

Advertising
background image

Extended Configuration Menu

Web-Based Management Interface

Intelligent Blade Panel Module

128

6.2.4.5 Managing Authentication Configuration

6.2.4.5.1 Defining Authentication List Configuration Page

You use this screen to configure login lists. A login list specifies the authentication method(s)
you want used to validate IBP or port access for the users associated with the list. The
pre-configured users, admin and guest, are assigned to a pre-configured list named defaultList,
which you may not delete. All newly created users are also assigned to the defaultList until you
specifically assign them to a different list

Selection Criteria

Authentication List

- Select the authentication login list you want to configure. Select

'create' to define a new login list. When you create a new login list, 'local' is set as the initial
authentication method.

Configurable Data

Authentication List Name

- If you are creating a new login list, enter the name you want

to assign. It can be up to 15 alphanumeric characters and is not case sensitive.

Method 1

- Use the dropdown menu to select the method that should appear first in the

selected authentication login list. If you select a method that does not time out as the first
method, such as 'local' no other method will be tried, even if you have specified more than
one method. Note that this parameter will not appear when you first create a new login list.
The options are:

Local

- the user's locally stored ID and password will be used for authentication

Radius

- the user's ID and password will be authenticated using the RADIUS server

instead of locally

Reject

- the user is never authenticated

Tacacs

- the user's ID and password will be authenticated using the TACACS server

instead of locally

Undefined

- the authentication method is unspecified (this may not be assigned as the

first method)

Method 2

- Use the dropdown menu to select the method, if any, that should appear

second in the selected authentication login list. This is the method that will be used if the
first method times out. If you select a method that does not time out as the second method,
the third method will not be tried. Note that this parameter will not appear when you first
create a new login list.

Method 3

- Use the dropdown menu to select the method, if any, that should appear third

in the selected authentication login list. Note that this parameter will not appear when you
first create a new login list.

Command Buttons

Submit

- Sends the updated screen to the IBP and causes the changes to take effect on

the IBP. These changes will not be retained across a power cycle unless you perform a
save.

Delete

- Remove the selected authentication login list from the configuration. The delete

will fail if the selected login list is assigned to any user (including the default user) for
system login or IEEE 802.1x port access control. You can only use this button if you have
Read/Write access. The change will not be retained across a power cycle unless you

Advertising