System information

202 | Chapter 7: Managing Device Security
GS752TXS Smart Switch Software Administration Manual
specified more than one method. This parameter will not appear when you first create a new
login list. User authentication occurs in the order the methods are selected. Possible
methods are as follows:
Local: The user's locally stored ID and password will be used for authentication.
Since the local method does not time out, if you select this option as the first method,
no other method will be tried, even if you have specified more than one method.
RADIUS: The user's ID and password will be authenticated using the RADIUS server.
If you select RADIUS or TACACS+ as the first method and an error occurs during the
authentication, the switch uses Method 2 to authenticate the user.
TACACS+: The user's ID and password will be authenticated using the TACACS+
server. If you select RADIUS or TACACS+ as the first method and an error occurs
during the authentication, the switch attempts user authentication Method 2.
None: The authentication method is unspecified. This option is only available for
Method 2 and Method 3.
3. Use the menu in the 2 column to select the authentication method, if any, that should appear
second in the selected authentication login list. This is the method that will be used if the first
method times out. If you select a method that does not time out as the second method, the
third method will not be tried. This parameter will not appear when you first create a new
login list.
4. Use the menu in the 3 column to select the authentication method, if any, that should appear
third in the selected authentication login list. This parameter will not appear when you first
create a new login list.
5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
6. If you make changes to the page, click Apply to apply the changes to the system.
Configuring Management Access
From the Access page, you can configure HTTP and Secure HTTP access to the GS752TXS
management interface. You can also configure Access Control Profiles and Access Rules.
The Security Access tab contains the following folders:
HTTP Configuration on page 202
Secure HTTP Configuration on page 203
Certificate Download on page 205
Certificate Management on page 206
Access Control on page 207
HTTP Configuration
Use the HTTP Configuration page to configure the HTTP server settings on the system.
To access the HTTP Configuration page, click the Security tab, then click Access, and then
click the HTTP
HTTP Configuration link.