USING THE WEB MANAGEMENT INTERFACE
To configure an authentication-method list with the Web management interface, use the following procedure. This
example to causes the device to use a RADIUS server to authenticate attempts to log in through the CLI:
Log on to the device using a valid user name and password for read-write access. The System configuration
panel is displayed.
Select the Management link to display the Management panel.
Select the Authentication Methods link to display the Login Authentication Sequence panel, as shown in the
Select the type of access for which you are defining the authentication method list from the Type field's
pulldown menu. Each type of access must have a separate authentication-method list. For example, to
define the authentication-method list for logging into the CLI, select Login.
Select the primary authentication method by clicking the button next to the method. For example, to use a
RADIUS server as the primary means of authentication for logging on to the CLI, select RADIUS.
Click the Add button to save the change to the device's running-config file. The access type and
authentication method you selected are displayed in the table at the top of the dialog. Each time you add an
authentication method for a given access type, the software assigns a sequence number to the entry. When
the user tries to log in using the access type you selected, the software tries the authentication sources in
ascending sequence order until the access request is either approved or denied. Each time you add an entry
for a given access type, the software increments the sequence number. Thus, if you want to use multiple
authentication methods, make sure you enter the primary authentication method first, the secondary
authentication method second, and so on.
If you need to delete an entry, select the access type and authentication method for the entry, then click
Table 3.7: Authentication Method Values (Continued)
Do not use any authentication method. The device automatically
3 - 47