Mapping Authentication Profiles - Cisco Linksys SFE1000P Reference Manual

8-port 10/100 ethernet switch with poe
Hide thumbs Also See for Linksys SFE1000P:
Table of Contents

Advertisement

Mapping Authentication Profiles

After authentication profiles are defined, they can be applied to management access methods. For
example, console users can be authenticated by one authentication profile, while Telnet users are
authenticated by another authentication profile.
Authentication methods are selected using arrows. The order in which the methods are selected is
the order by which the authentication methods are used.
The Mapping Profiles Page contains parameters for mapping authentication methods.
The Mapping Profiles Page contains the following fields:
Console — Indicates that Authentication profiles are used to authenticate console users.
Telnet — Indicates that Authentication profiles are used to authenticate Telnet users.
Secure Telnet (SSH) — Indicates that Authentication profiles are used to authenticate Secure
Shell (SSH) users. SSH provides clients secure and encrypted remote connections to a
device.
Secure HTTP — Configures the device Secure HTTP settings.
Optional Methods — Lists available authentication methods.
Local — Authenticates the user at the device level. The device checks the user name and
password for authentication.
RADIUS — Remote Authorization Dial-In User Service (RADIUS) servers provide
additional security for networks.
Chapter 5: Configuring Device Security
Defining Authentication
SFE1000P Gigabit Ethernet Switch Reference Guide
Mapping Profiles Page
Chapter
5
21

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sfe1000p

Table of Contents