Software User Manual
12/10/09
A
UTHENTICATION
Use the Authentication List Summary page to view information about the authentication lists on the system and which
users are associated with each list. The page also displays information about 802.1X port security users.
To access the Authentication List Summary page, click LAN > Monitoring > Authentication List Summary in the
navigation tree.
The Authentication List Summary page has the following read-only fields:
Field
Authentication List
Method List
Login Users
802.1X Port Security Users
•
Click Refresh to update the information on the screen.
•
To assign users to a specific authentication list, see
users, see
"Port Access Control" on page
Document
34CSFP6XXUWS-SWUM100-D7
L
S
IST
UMMARY
Figure 23: Login Session
Table 16: Login Fields
Description
Identifies the name of the authentication login list summarized in this row.
Shows the order of the login methods configured for the list.
Shows the users assigned to this login list on the User Login Configuration screen.
This list is used to authenticate the users for system login access.
Shows the port access control users assigned to this login list. This list is used to
authenticate the users for port access by using the IEEE 802.1X protocol.
383.
D-Link Unified Access System
"User Login" on page
77. To configure the 802.1X port security
Authentication List Summary
Page 75