Specifications
RICi-4E1/T1, RICi-8E1/T1 Installation and Operation Manual Chapter 4 Configuration
RICi-4E1/T1, RICi-8E1/T1 Ver. 2.0 Configuring for Management 4-9
Defining the Access Policy
Access policy allows configuration of multiple authentication protocols. User
authentication is performed in the order the methods are selected. If the first
authentication method is not available, the next selected method is used.
³ To define the access policy:
• From the Management Access menu (Configuration > System > Management
> Management Access), select Access Policy.
The Access Policy menu appears as illustrated in
Figure
4-9
and
Table
4-2.
RICi-4E1/T1, RICi-8E1/T1
Configuration > System > Management > Management Access >
Access Policy
1. 1
st
Level (Radius)
2. 2
nd
Level (Local)
ESC-prev.menu; !-main menu; &-exit
Figure
4-9. Access Policy
Table
4-2. Access Policy
Parameter Possible Values Remarks
1st Level Local
Radius
• Local: RICi-4E1/T1, RICi-8E1/T1 uses the
locally-stored authentication database
• Radius: RICi-4E1/T1, RICi-8E1/T1 uses the
authentication database stored on the
Radius server.
If you select Radius, then 2nd Level becomes
available. If the user name is not found in
the Radius Server database or the password
you enter does not match the user name,
the authentication fails.
Default: Local
2nd Level None
Local
• None: RICi-4E1/T1, RICi-8E1/T1 is available
via only the first level.
• Local: RICi-4E1/T1, RICi-8E1/T1 uses the
locally-stored authentication database.
Default: Local
Note: This parameter appears only if 1st Level is
set to Radius.