Configuring Device Security
Configuring Server Based Authentication
Page 55
Configuring Server Based Authentication
Network administrators assign authentication methods for user authentication. User authentication can be
performed locally, or on an external server. User authentication occurs in the order the methods are selected.
If the first authentication method is not available, the next selected method is used.
This section describes the following configuration methods:
•
Configuring
•
Configuring RADIUS
•
Configuring Local Users
•
Defining Line Passwords
Configuring
Terminal Access Controller Access Control System
() provides centralized security user access
validation. The system supports up-to 8 servers. provides a centralized user management
system, while still retaining consistency with RADIUS and other authentication processes. provides the
following services:
•
Authentication
— Performed at login and via user names and user-defined passwords.
•
Authorization
— Performed at login. Once the authentication session is completed, an authorization session
starts using the authenticated user name.
The protocol ensures network integrity through encrypted protocol exchanges between the client and
server.
To define security settings:
1.
Click
Mgmt. Protocols >
. The
Page
opens.