Configuring Device Security
Defining Authentication
Cisco Small Business SFE/SGE Managed Switches Administration Guide
48
4
Mapping Authentication Profiles
After authentication profiles are defined, authentication profiles can be applied to
management access methods. For example, console users can be authenticated
by one authentication profile, while Telnet users are authenticated by another
authentication profile.
Authentication methods are selected using arrows. The order in which the
methods are selected is the order by which the authentication methods are used.
The
Mapping Profiles Page
contains parameters for mapping authentication
methods. To map authentication profiles:
STEP 1
Click Security Suite > Authentication > Mapping Profiles. The
Mapping Profiles
Page
opens:
Mapping Profiles Page
The
Mapping Profiles Page
contains the following fields:
•
Console — Indicates that Authentication profiles are used to authenticate
console users.
•
Telnet — Indicates that Authentication profiles are used to authenticate Telnet
users.
•
Secure Telnet (SSH) — Indicates that Authentication profiles are used to
authenticate Secure Shell (SSH) users. SSH provides clients secure and
encrypted remote connections to a device.