73
Table of Contents
Linksys
If an authentication method fails or the user has insufficient privilege
level, the user is denied access to the device If authentication fails at an
authentication method, the device stops the authentication attempt; it does
not continue and does not attempt to use the next authentication method
To define authentication methods for an access method:
STEP 1 Click Configuration > Security > Managed Security > Access
Authentication
STEP 2 Select an access method from the Application list
STEP 3 Use the arrows to move the authentication method between the
Method Available column and the Method To Use column The first
method selected is the first method that is used
•
RADIUS—User is authenticated on a RADIUS server You must have
configured one or more RADIUS servers
•
None—User is allowed to access the device without authentication
•
Local—Username and password are checked against the data stored on
the local device These username and password pairs are defined in the
User Accounts page
NOTE:
The Local or None authentication method must always be selected last All
authentication methods selected after Local or None are ignored
STEP 4 Click Apply The selected authentication methods are associated with
the access method
Access Method
Access profiles determine how to authenticate and authorize users accessing
the device through various access methods Access Profiles can limit
management access from specific sources
Only users who pass both the active access profile and are authorized based
on the authentication methods that correspond to the Access Method
are given management access to the device For more information, see
Management Access Authentication
There can only be a single access profile active on the device at one time
Access profiles consist of one or more rules The rules are executed in order of
their priority within the access profile (top to bottom)
Rules are composed of filters that include the following elements:
•
Access Methods—Methods for accessing and managing the device: The
authentication method for the selected access method is specified in
Management Access Authentication
•
Telnet
•
Hypertext Transfer Protocol (HTTP)
•
Secure HTTP (HTTPS)
•
Simple Network Management Protocol (SNMP)
•
All of the above
•
Action—Permit or deny access to an interface or source address
•
Interface—Which ports, LAGs, or VLANs are permitted to access or are
denied access to the web-based configuration utility
•
Source IP Address—IP addresses or subnets Access to management
methods might differ among user groups For example, one user group
might be able to access the device module only by using an HTTPS
session, while another user group might be able to access the device
module by using both HTTPS and Telnet sessions
Access Profile
The Access Profile page displays the access profiles that are defined and
enables selecting one access profile to be the active one
When a user attempts to access the device through an access method, the
device looks to see if the active access profile explicitly permits management
access to the device through this method If no match is found, access is denied
When an attempt to access the device is in violation of the active access
profile, the device generates a SYSLOG message to alert the system
administrator of the attempt
For more information, see Defining Profile Rules
Use the Access Profiles page to create an access profile and to add its first
rule If the access profile only contains a single rule, you are finished To add
additional rules to the profile, use the Profile Rules page
STEP 1 Click Configuration > Security > Management Security > Access Profile
This page displays all of the access profiles, active and inactive