TP-Link TL-SG3109 Switch User Manual


 
24
25
Each of the tables contains the following elds:
Prole Name — Contains a list of user-dened authentication prole lists to which user-dened authentication proles
are added.
Methods — Denes the user authentication methods. The possible eld values are:
None — Assigns no authentication method to the authentication prole.
Local — Authenticates the user at the device level. The device checks the user name and password for authentication.
RADIUS — Authenticates the user at the RADIUS server. For more information, see Dening RADIUS Server Settings.
Line — Authenticates the user using a line password.
Enable — Authenticates the user using an enable password.
Remove — Removes the selected authentication prole. The possible eld values are:
Checked — Removes the selected authentication prole.
Unchecked — Maintains the authentication proles.
2. Click . The Add Authentication Prole Page opens.
Figure 30: Add Authentication Prole Page
3. Dene the Prole Method and enter the Prole Name
elds.
4. Select the Authentication Method using the move arrow
.
5. Click
. The authentication profile is defined,
and the device is updated.
To modify an authentication prole:
1. Click System > Management Security > Authentication > Authentication Proles. The Authentication Proles Page
opens.
2. Click . The Authentication Prole Settings Page opens:
Figure 31: Authentication Prole Settings Page
3. Select the Authentication Method using the move arrow
.
4. Click . The authentication method is selected,
and the device is updated.
5.1.1.4 Mapping Authentication Proles
After authentication proles are dened, they can be applied to management access methods. For example, console users
can be authenticated by Authentication Prole List 1, while Telnet users are authenticated by Authentication Method List 2.
Authentication methods are selected using arrows. The order in which the methods are selected is the order by which the
authentication methods are used.
To map authentication methods:
1. Click System > Management Security > Authentication > Authentication Mapping. The Authentication Mapping
Page opens: