Mapping Authentication Profiles
After authentication profiles are defined, they can be applied to management access methods. For
example, console users can be authenticated by one authentication profile, while Telnet users are
authenticated by another authentication profile.
Authentication methods are selected using arrows. The order in which the methods are selected is
the order by which the authentication methods are used.
The Mapping Profiles Page contains parameters for mapping authentication methods.
The Mapping Profiles Page contains the following fields:
•
Console — Indicates that Authentication profiles are used to authenticate console users.
•
Telnet — Indicates that Authentication profiles are used to authenticate Telnet users.
•
Secure Telnet (SSH) — Indicates that Authentication profiles are used to authenticate Secure
Shell (SSH) users. SSH provides clients secure and encrypted remote connections to a
device.
•
Secure HTTP — Configures the device Secure HTTP settings.
–
Optional Methods — Lists available authentication methods.
–
Local — Authenticates the user at the device level. The device checks the user name and
password for authentication.
–
RADIUS — Remote Authorization Dial-In User Service (RADIUS) servers provide
additional security for networks.
Chapter 5: Configuring Device Security
Defining Authentication
SFE1000P Gigabit Ethernet Switch Reference Guide
Mapping Profiles Page
Chapter
5
21