Mapping Authentication Methods - Alcatel OS-LS-6224 User Manual

User guide
Hide thumbs Also See for OS-LS-6224:
Table of Contents

Advertisement

3
Configuring the Switch

Mapping Authentication Methods

After authentication profiles are defined, they can be applied to management access
methods. For example, console users can be authenticated by Authentication Profile
List 1, while Telnet users are authenticated by Authentication Method List 2.
Authentication methods are selected using arrows. The order in which the methods
are selected is the order by which the authentication methods are used.
The Authentication Mapping Page contains parameters for mapping authentication
methods:
Command Attributes
• Console — Authentication profiles used to authenticate console users.
• Telnet — Authentication profiles used to authenticate Telnet users.
• Secure Telnet (SSH) — Authentication profiles used to authenticate Secure Shell
(SSH) users. SSH provides clients secure and encrypted remote connections to a
device.
• Secure HTTP — Authentication methods used for Secure HTTP access. Possible
field values are:
• None — No authentication method is used for access.
• Local — Authentication occurs locally.
• RADIUS — Authentication occurs at the RADIUS server.
• TACACS+ — Authentication occurs at the TACACS+ server.
• Line — Authentication using a line password.
• Enable — Authentication using enable.
• Local, RADIUS — Authentication first occurs locally. If authentication cannot be
verified locally, the RADIUS server authenticates the management method. If
the RADIUS server cannot authenticate the management method, the session
is blocked.
• RADIUS, Local — Authentication first occurs at the RADIUS server. If
authentication cannot be verified at the RADIUS server, the session is
authenticated locally. If the session cannot be authenticated locally, the session
is blocked.
• Local, RADIUS, None — Authentication first occurs locally. If authentication
cannot be verified locally, the RADIUS server authenticates the management
method. If the RADIUS server cannot authenticate the management method,
the session is permitted.
• RADIUS, Local, None — Authentication first occurs at the RADIUS server. If
authentication cannot be verified at the RADIUS server, the session is
authenticated locally. If the session cannot be authenticated locally, the session
is permitted.
• HTTP — Authentication methods used for HTTP access. Possible field values are:
• None — No authentication method is used for access.
• Local — Authentication occurs locally.
• RADIUS — Authentication occurs at the RADIUS server.
110

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents