D-Link DES-7200 Refrigerator User Manual


  Open as PDF
of 1968
 
DES-7200 Configuration Guide Chapter 1 AAA Configuration
1-2
Note
The AAA of some products only provides the authentication function. For all
problems with product specifications, contact the market or technical support
personnel.
Although the AAA is the primary access control method, our product also provides simple
control accesses out of the range of AAA, such as the local username authentication, line
password authentication and more. The difference lies in the degree of their network
protection, and the AAA provides the security protection of a higher level.
The AAA has the following advantages:
z Powerful flexibility and controllability
z Expandability
z Standardized authentication
z Multiple backup systems
1.1.1 Basic AAA Principles
The AAA can configure dynamically authentication, authorization and accounting for a
single user (line) or server. It defines the authentication, authorization and accounting by
means of creating method lists and then applies them on specific services or interfaces.
1.1.2 Method List
Since the authentication for users can be implemented in a variety of ways, you need to
use the method list to define the sequence of using different method to perform
authentication for the users. The method list can define one or more security protocols for
authentication, so that there are backup systems available for the authentication in case of
the failure of the first method. Our product works with the first method in the method list for
user authentication, and then selects the next method in the method list in case of no reply
from that method. This process goes on till an authentication method listed successfully
allows communication or all methods listed are used up. If all methods listed are used up
but the communication is not allowed, it declares failure of authentication.
Caution
Only when there is no reply from a method, our product will attempt the next
method. During the authentication, if the user access is refused by a method,
the authentication process ends and no other methods will be attempted.