Configuring Device Security
Defining Authentication
STEP 1
ESW 500 Series Switches Administration Guide
Mapping Authentication Profiles
After authentication profiles are defined, authentication profiles can be applied to
management access methods. For example, console users can be authenticated
by one authentication profile, while Telnet users are authenticated by another
authentication profile.
Authentication methods are selected using arrows. The order in which the
methods are selected is the order by which the authentication methods are used.
Mapping Profiles Page
The
methods. To map authentication profiles:
Click Security > Authentication > Mapping Profiles. The
opens:
Mapping Profiles Page
Mapping Profiles Page
The
•
Console — Indicates that Authentication profiles are used to authenticate
console users.
•
Telnet — Indicates that Authentication profiles are used to authenticate Telnet
users.
contains parameters for mapping authentication
contains the following fields:
5
Mapping Profiles Page
104