Mapping Authentication Profiles - Allied Telesis AT-S94 User Manual

Layer 2 ethernet switch
Hide thumbs Also See for AT-S94:
Table of Contents

Advertisement

Mapping Authentication Profiles

After authentication profiles are defined, they can be applied to management access methods. For example,
console users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by
Authentication Profile List 2. Authentication methods are selected using arrows. The order in which the methods
are selected is the order by which the authentication methods are used.
To map authentication methods:
1.
Click Mgmt. Security > Authentication Mapping. The Authentication Mapping Page opens:
Figure 18: Authentication Mapping Page
The Authentication Mapping Page comprises three sections:
Authentication Login and Enable
Secure HTTP
HTTP
The Authentication Mapping Page contains the following fields:
Console — Indicates that authentication profiles are used to authenticate console users.
Telnet — Indicates that authentication profiles are used to authenticate Telnet users.
Secure Telnet (SSH) — Indicates that authentication profiles are used to authenticate Secure Shell (SSH)
users. SSH provides clients secure and encrypted remote connections to a device.
Page 36
Configuring Device Security
Configuring Management Security

Advertisement

Table of Contents
loading

Table of Contents