21
Chapter 5: Configuring Device Security
Defining Authentication
SFE1000P Gigabit Ethernet Switch Reference Guide
Chapter
5
Mapping Authentication Profiles
After authentication profiles are defined, they can be applied to management access methods. For
example, console users can be authenticated by one authentication profile, while Telnet users are
authenticated by another authentication profile.
Authentication methods are selected using arrows. The order in which the methods are selected is
the order by which the authentication methods are used.
The
Mapping Profiles Page
contains parameters for mapping authentication methods.
Mapping Profiles Page
The
Mapping Profiles Page
contains the following fields:
•
Console
— Indicates that Authentication profiles are used to authenticate console users.
•
Telnet
— Indicates that Authentication profiles are used to authenticate Telnet users.
•
Secure Telnet (SSH)
— Indicates that Authentication profiles are used to authenticate Secure
Shell (SSH) users.
SSH provides clients secure and encrypted remote connections to a
device.
•
Secure HTTP
— Configures the device Secure HTTP settings.
–
Optional Methods
— Lists available authentication methods.
–
Local
—
Authenticates the user at the device level. The device checks the user name and
password for authentication.
–
RADIUS
— Remote Authorization Dial-In User Service (RADIUS) servers provide
additional security for networks.