Mapping Authentication Methods - D-Link xStack DES-3228PA Web/Installation Manual

Layer 2 stackable 10/100mbps ethernet switch with poe
Hide thumbs Also See for xStack DES-3228PA:
Table of Contents

Advertisement

Mapping Authentication Methods

After authentication profiles are defined, they can be applied to management access methods. For example, con-
sole users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authenti-
cation Method List 2.
Authentication methods are selected using arrows. The order in which the methods are selected is the order by
which the authentication methods are used.
To map authentication methods:
1.
Click System > Management Security > Authentication > Authentication Mapping. The Authentication
Mapping Page opens.
Figure 65: Authentication Mapping Page
The Authentication Mapping Page contains the following fields:
Console — Indicates that Authentication profiles are used to authenticate console users.
Telnet — Indicates that Authentication profiles are used to authenticate Telnet users.
Secure Telnet (SSH) — Indicates that Authentication profiles are used to authenticate Secure Shell (SSH)
users. SSH provides clients secure and encrypted remote connections to a device.
Optional Methods — Displays the methods by which users are authenticated during an HTTP session. The
possible field values are:
None — Indicates that no authentication method is used for access.
RADIUS — Indicates that authentication occurs at the RADIUS server.
Local — Indicates that authentication occurs at the local server.
HTTP — Indicates that Authentication methods are used for HTTP access. Possible field values are:
Page 116
Configuring Device Security
Configuring Management Security

Advertisement

Table of Contents
loading

Table of Contents