Chapter
4
SFE2000/SFE2000P Gigabit Ethernet Switch Reference Guide
•
Profile Name — Displays the Authentication profile name.
•
Authentication Methods — Defines the user authentication methods. The possible field values are:
–
Local — Authenticates the user at the device level. The device checks the user name and
password for authentication.
–
RADIUS — Authenticates the user at the RADIUS server.
–
TACACS+ — Authenticates the user at the TACACS+ server.
3. Define the relevant fields.
4. Click Apply. The authentication profile is defined, and the device is updated.
Mapping Profiles
1. Click Security Management > Security Suite > Authentication. The Mapping Profiles Page
opens:
The Mapping Profiles Page contains the following fields:
•
Console — Indicates that Authentication profiles are used to authenticate console users.
•
Telnet — Indicates that Authentication profiles are used to authenticate Telnet users
•
Secure Telnet (SSH) — Indicates that Authentication profiles are used to authenticate Secure Shell
(SSH) users. SSH provides clients secure and encrypted remote connections to a device.
•
Secure HTTP — Configures the device Secure HTTP settings.
28
Mapping Profiles Page
Chapter 4: