Configuring Device Security
Defining Authentication
Cisco Small Business SFE/SGE Managed Switches Administration Guide
45
4
STEP 1
Click Security Suite > Authentication > Profiles. The
Profiles Page
opens:
Profiles Page
The
Profiles Page
contains the following fields:
•
Profile Name — Displays the Profile name defined for the Login Table.
•
Methods — Defines the user authentication methods. The order of the
authentication methods defines the order in which authentication is attempted.
For example, if the authentication method order is RADIUS, Local, the system
first attempts to authenticate the user on a RADIUS server. If there is no
available RADIUS server, then authentication is attempted on the local data
base. Note that if the RADIUS server is available, but authentication fails, then
the user is denied access. The possible field values are:
-
Local
— Authenticates the user at the device level. The device checks
the user name and password for authentication.
-
RADIUS
— Authenticates the user at the RADIUS server.
-
— Authenticates the user at the server.
-
None
— Indicates that no authentication method is used to authenticate
the user.
STEP 2
Click the Add button. The
Add Authentication Profile Page
opens: