Access Profiles - Cisco SF 300-08 Administration Manual

Cisco small business 300 series managed switch
Hide thumbs Also See for SF 300-08:
Table of Contents

Advertisement

Configuring Security

Access Profiles

STEP 4
Access Profiles
Cisco Small Business 300 Series Managed Switch Administration Guide
RADIUS—User is authenticated on a RADIUS server. You must have
configured one or more RADIUS servers.
TACACS+—User authenticated on the TACACS+ server. You must have
configured one or more TACACS+ servers.
None—User is allowed to access the switch without authentication.
Local—Username and password is checked against the data stored on the
local switch. These username and password pairs are defined in the User
Accounts Page.
The Local or None authentication method must always be
NOTE
selected last. All authentication methods selected after Local or None
are ignored.
Click Apply. The selected authentication methods are associated with the access
method.
Management Access Authentication configures the authentication methods to be
used to authenticate and authorize users from different management access
methods. Management Access Profiles limit management access from specific
interfaces and/or sources.
Only users who pass both the active access profile and management access
authentication are given management access to the switch.
Access Profile Rules, Filters, and Elements
Access profiles consist of rules for allowing access to the switch. Each access
profile can consist of one or more rules. The rules are executed in order of their
priority within the access profile (top to bottom).
Rules are composed of filters that include the following elements:
Access Methods—Methods for accessing and managing the switch:
-
Telnet
-
Secure Telnet (SSH)
-
Hypertext Transfer Protocol (HTTP)
16
201

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents