Iniciar sesión:
Votos - 3, Puntuación media: 4 ( )

Manual de usuario Fujitsu, modelo PRIMERGY BX600

Fabricar: Fujitsu
Tamaño del archivo: 2.14 mb
Nombre del archivo: a884d975-003c-416f-b19f-b19288adb685.pdf
Idioma del manual:en
Enlace gratuito para este manual disponible en la parte inferior de la página



Resumen del manual


Select up to five management stations used to manage the IBP. If you choose to define one or more designated management stations, only the chosen stations, as defined by IP address, will be allowed management privilege through the web manager, Telnet session, Secure Shell (SSH) or Secure Socket Layer (SSL) for secure HTTP. Configurable Data Filter Address 1~5 - Stations that are allowed to make configuration changes to the IBP. Command Buttons Submit - Send the updated screen to the IBP. Changes take effect on the IPB but these changes will not be retained across a power cycle unless a save is performed. Intelligent Blade Panel Module Extended Configuration Menu Web-Based Management Interface 6.2.4.5 Managing Authentication Configuration 6.2.4.5.1 Defining Authentication List Configuration Page You use this screen to configure login lists. A login list specifies the authentication method(s) you want used to validate IBP or port access for the users associated with the list. The pre-configured users, admin and guest, are assigned to a pre-configured list named defaultList, which you may not delete. All newly created users are also assigned to the defaultList until you specifically assign them to a different list Selection Criteria Authentication List - Select the authentication login list you want to configure. Select 'create' to define a new login list. When you create a new login list, 'local' is set as the initial authentication method. Configurable Data Authentication List Name - If you are creating a new login list, enter the name you want to assign. It can be up to 15 alphanumeric characters and is not case sensitive. Method 1 - Use the dropdown menu to select the method that should appear first in the selected authentication login list. If you select a method that does not time out as the first method, such as 'local' no other method will be tried, even if you have specified more than one method. Note that this parameter will not appear when you first create a new login list. The options are: Local- the user's locally stored ID and password will be used for authentication Radius- the user's ID and password will be authenticated using the RADIUS server instead of locally Reject- the user is never authenticated Tacacs- the user's ID and password will be authenticated using the TACACS server instead of locally Undefined- the authentication method is unspecified (this may not be assigned as the first method) Method 2 - Use the dropdown menu to select the method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. Note that this parameter will not appear when you first create a new login list. Method 3 - Use the dropdown menu to select the method, if any, that should appear third in the selected authentication login list. Note that this parameter will not appear when you first create a new login list. Command Buttons Submit - Sends the updated screen to the IBP and causes the changes to take effect on the IBP. These changes will not be retained across a power cycle unless you perform a save. Delete - Remove the selected authentication login list from the configuration. The delete will fail if the selected login list is assigned to any user (including the default user) for system login or IEEE 802.1x port access control. You can only use this button if you have Read/Write access. The change will not be retained across a power cycle unless you Intelligent Blade Panel Module Extended Configuration Menu Web-Based Management Interface perform a save. 6.2.4.5.2 Viewing Authentication List Summary Page Non-Configurable Data Authentication List - Identifies the authentication login list summarized in this row. Method List - The ordered list of methods configured for this login list. Login Users - The users you assigned to this login list on the User Login Configuration screen. This list is used to authenticate the users for system login access. 802.1x Port Security Users The users you assigned to this login list on the Port Access Control User Login Configuration screen - This list is used to authenticate the users for port access, using the IEEE 802.1x protocol. Command Buttons Refresh - Update the information on the page. 6.2.4.5.3 Defining User Login Page Note: This page provides a user account (from those already created) to be added into the Authentication List. Each configured user is assigned to a login list that specifies how the user should be authenticated when attempting to access the IBP or a port on the IBP. After creating a new user account on the User Account screen, you should assign that user to a login list for the IBP using this screen and, if necessary, to a login list for the ports using the Port Access Control Intelligent Blade Panel Module Extended Configuration Menu Web-Based Management Interface ...

Otros modelos de este manual:
Computadoras - PRIMERGY BX600 (2.14 mb)

Comentarios



Tu reseña
Tu nombre:
Introduzca dos números de la imagen:
capcha





Categoría