Configuring Device Security
Configuring Management Security
Page 53
Mapping Authentication Profiles
After authentication profiles are defined, they
can be applied to management access
methods. For example,
console users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by
Authentication Profile List 2. Authentication methods are selected using arrows. The order in which the methods
are selected is the order by which the authentication methods are used.
To map authentication methods:
1.
Click
Mgmt. Security > Authentication Mapping
. The
Authentication Mapping Page
opens:
Figure 26: Authentication Mapping Page
The
Authentication Mapping Page
comprises three sections:
•
Authentication Login and Enable
•
Secure HTTP
•
HTTP
The
Authentication Mapping Page
contains the following fields:
•
Console
— Indicates that authentication profiles are used to authenticate console users.
•
Telnet
— Indicates that authentication profiles are used to authenticate Telnet users.
•
Secure Telnet (SSH
) — Indicates that authentication profiles are used to authenticate Secure Shell (SSH)
users. SSH provides clients secure and encrypted remote connections to a device.