CLI – The following is an example of the CLI commands used for configuring Profile
Rules:
Console(config)# ip http server
4-691
Console(config)# ip https server
4-693
Defining Authentication Profiles
Authentication profiles allow network administrators to assign authentication
methods for user authentication. User authentication can be performed locally or on
an external server. User authentication occurs in the order the methods are
selected. If the first authentication method is not available, the next selected method
is used. For example, if the selected authentication methods are RADIUS and Local,
and the RADIUS server is not available, then the user is authenticated locally.
Command Attributes
• Profile Name — User-defined authentication profile lists to which user-defined
authentication profiles are added.
• Methods — Defines the user authentication methods. The possible field values
are:
• None — Assigns no authentication method to the authentication profile.
• Local — Authenticates the user at the device level. The device checks the user
name and password for authentication.
• RADIUS — Authenticates the user at the RADIUS server.
Figure 3-45. Profiles Rules Page
Configuring Authentication Methods
3
109