42
Chapter 4:
SFE2000/SFE2000P Gigabit Ethernet Switch Reference Guide
Chapter
4
• Profile Name — Displays the Authentication profile name.
• Authentication Methods — Defines the user authentication methods. The possible field values are:
– Local — Authenticates the user at the device level. The device checks the user name and
password for authentication.
– RADIUS — Authenticates the user at the RADIUS server.
– TACACS+ — Authenticates the user at the TACACS+ server.
3. Define the relevant fields.
4. Click Apply. The authentication profile is defined, and the device is updated.
Mapping Profiles
1. Click Security Management > Security Suite > Authentication. The Mapping Profiles Page
opens:
Mapping Profiles Page
The Mapping Profiles Page contains the following fields:
• Console — Indicates that Authentication profiles are used to authenticate console users.
• Telnet — Indicates that Authentication profiles are used to authenticate Telnet users
• Secure Telnet (SSH) — Indicates that Authentication profiles are used to authenticate Secure Shell
(SSH) users. SSH provides clients secure and encrypted remote connections to a device.
• Secure HTTP — Configures the device Secure HTTP settings.