| Configuring the Switch
C
4
HAPTER
Configuring Security
Figure 13: Configuring Privilege Levels
Use the Authentication Method Configuration page to specify the
C
T
ONFIGURING
HE
authentication method for controlling management access through the
A
UTHENTICATION
console, Telnet, SSH or HTTP/HTTPS. Access can be based on the (local)
M
F
ETHOD
OR
user name and password configured on the switch, or can be controlled
M
A
ANAGEMENT
CCESS
with a RADIUS or TACACS+ remote access authentication server. Note that
the RADIUS servers used to authenticate client access for IEEE 802.1X port
authentication are also configured on this page (see
page
90).
Remote Authentication Dial-in User Service (RADIUS) and Terminal Access
Controller Access Control System Plus (TACACS+) are logon authentication
protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An
authentication server contains a database of multiple user name/password
pairs with associated privilege levels for each user that requires
management access to the switch.
– 65 –