Transition Networks
SISGM
–CHAS L2/L3 Switch User Guide
33625 Rev. B
Page
53
of
234
5.1.3 Authentication
This page allows you to configure how a user is authenticated when they log into the switch via
one of the management interfaces.
The table has one row for each client type and these columns:
Label
Description
Client
The management client for which the configuration below applies
(console, telnet, ssh, http).
Authentication
Methods
The Authentication Method can be set to one of the following values:
no
: Authentication is disabled and login is not possible.
local
: Use the local user database on the switch stack for authentication.
radius
: Use remote RADIUS server(s) for authentication.
: Use
remote
server(s) for authentication.
Methods that involve remote servers are timed out if the remote servers
are offline. In this case the next method is tried. Each method is tried from
left to right and continues until a method either approves or rejects a user.
If a remote server is used for primary authentication it is recommended to
configure secondary authentication as '
local
'. This will enable the
management client to login via the local user database if none of the
configured authentication servers are alive.
Save
Click to save changes.
Reset
Click to undo any changes made locally and revert to previously saved
values