185
GS716T and GS724T Gigabit Smart Switches
3. Use the menu in the 2 column to select the authentication method, if any, that should appear
second in the selected authentication login list. This is the method that will be used if the first
method times out. If you select a method that does not time out as the second method, the
third method will not be tried. This parameter will not appear when you first create a new
login list.
4. Use the menu in the 3 column to select the authentication method, if any, that should appear
third in the selected authentication login list. This parameter will not appear when you first
create a new login list.
5. Click Cancel to cancel the configuration on the screen and reset the data on the screen to
the latest value of the switch.
6. If you make changes to the page, click Apply to apply the changes to the system.
Configuring Management Access
From the Access page, you can configure HTTP and Secure HTTP access to the GS716T
and GS724T management interface. You can also configure Access Control Profiles and
Access Rules.
The Security Access tab contains the following folders:
• HTTP Configuration on page 186
• Secure HTTP Configuration on page 187
• Certificate Download on page 188
• Access Profile Configuration on page 190
• Access Rule Configuration on page 192