Configuring Security
Configuring Management Access Authentication
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x
200
16
STEP 4
Click
Apply
. The password complexity settings are defined, and the Running
Configuration is updated.
Configuring Management Access Authentication
You can assign authentication methods to the various management access
methods, such as SSH, console, Telnet, HTTP, and HTTPS. This authentication can
be performed locally or on an external server, such as a or a RADIUS
server.
For the RADIUS server to grant access to the web-based interface, the RADIUS
server must return cisco-avpair = shell:priv-lvl=15.
User authentication occurs in the order that the authentication methods are
selected. If the first authentication method is not available, the next selected
method is used. For example, if the selected authentication methods are RADIUS
and Local, and all configured RADIUS servers are queried in priority order and do
not reply, the user is authenticated locally.
If an authentication method fails or the user has insufficient privilege level, the user
is denied access to the switch. In other words, if authentication fails at an
authentication method, the switch stops the authentication attempt; it does not
continue and does not attempt to use the next authentication method.
To define authentication methods for an access method:
STEP 1
Click
Security
>
Management Access Authentication
.
STEP 2
Select an access method from the
Application
drop-down menu.
STEP 3
Move the authentication method between the
Optional Methods
column and the
Selected Methods
column. The first method selected is the first method that is
used. The applicable authentication methods are:
•
RADIUS
—User is authenticated on a RADIUS server. You must have
configured one or more RADIUS servers.
•
—User is authenticated on a server. You must have
configured one or more servers.
•
None
—User is allowed to access the switch without authentication.