Assigning Authentication Profiles
After Authentication Profiles are defined, the Authentication Profiles can be applied to
Management Access methods. For example, console users can be authenticated by Authentication
Method List 1, while Telnet users are authenticated by Authentication Method List 2. To open the
Select Authentication page, click System→ Management Security→ Select Authentication in the
tree view.
Figure 6-53. Select Authentication
Console — Authentication profiles used to authenticate console users.
Telnet — Authentication profiles used to authenticate Telnet users.
Secure Telnet (SSH) — Authentication profiles used to authenticate Secure Shell (SSH) users.
SSH provides clients with secure and encrypted remote connections to a switch module.
HTTP and Secure HTTP — Authentication method used for HTTP access and Secure HTTP
access, respectively. Possible field values are:
None — No authentication method is used for access.
Local — Authentication occurs locally.
RADIUS — Authentication occurs at the RADIUS server.
TACACS+ — Authentication occurs at the TACACS+ server.
Configuring System Information
131