Installation guide
7-26 Motorola RF Switch System Reference Guide
7. Optionally, click the Generate button to automatically create a username and password for each guest
user.
8. Repeat this process as necessary until all required guest users have been created with relevant
passwords and start/end guest group permissions.
7.6.2 Configuring Switch Authentication
The switch provides the capability to proxy authenticate requests to a remote Radius Server. Refer to the
Authentication tab to view and configure the Radius Server used by the local user to log into the switch.
1. Select Management Access > Users from the main menu tree.
2. Select the Authentication tab.
3. Refer to the Authentication methods field for the following:
If authentication services are not available, due to technical reasons, then select the option
provided in the panel to avail read-only access.
4. Click the Apply button to commit the authentication method for the switch.
NOTE: The Radius configuration described in this section is independent of other Radius
Server configuration activities performed using other parts of the switch.
Preferred Method Select the preferred method for authentication. Options include:
• None - No authentication
• Local - The user employs a local user authentication resource. This is the default
setting.
• Radius - Uses an external Radius Server
Alternate Method Select an alternate method for authentication. This drop-down menu will not list
the option already selected as the preferred method. Select any of the remaining
authentication methods as an alternate method.