Authentication Selection - Ubiquiti EdgeSwitch ES-24-250W Administration Manual

User interface for poe switches
Hide thumbs Also See for EdgeSwitch ES-24-250W:
Table of Contents

Advertisement

EdgeSwitch
Administration Guide

Authentication Selection

Use the Authentication Selection page to associate an authentication list with each CLI-based access method
(Telnet and SSH). Each access method has the following two authentication lists associated with it:
• Login – The authentication list to use for User EXEC-level management access to the CLI. Access at this
level has a limited number of CLI commands available to view or configure the system. The available
options include the default Login authentication lists as well as any user-configured Login lists.
• Enable – The authentication list to use for Privileged EXEC-level management access to the CLI. In
Privileged EXEC mode, read-write users have access to all CLI commands. The options available in this
menu include the default Enable authentication lists as well as any user-configured Enable lists.
To access this page, click System > AAA > Authentication Selection in the navigation menu.
The following table shows the fields for the Authentication Selection page.
Field
Console
Telnet
SSH
Use the command buttons to perform the following tasks:
• Click Submit to update the switch with the values on the screen.
• Click Refresh to update the information on the screen.
To retain the changes across the switch's next power cycle, click System > Configuration Storage > Save.
Line Password Configuration
Use the Line Password page to configure line mode passwords.
To display the page, click System > Passwords > Line Password in the navigation menu.
Ubiquiti Networks, Inc.
Authentication Selection
Authentication Selection Fields
Description
The Login authentication list and the Enable authentication list to apply to users who attempt to
access the CLI using a connection to the console port.
The Login authentication list and the Enable authentication list to apply to users who attempt to
access the CLI using a Telnet session.
The Login authentication list and the Enable authentication list to apply to users who attempt to
access the CLI using a secure shell (SSH) session.
Configuring System Information
44

Advertisement

Table of Contents
loading

Table of Contents