User guide

24
25
Each of the tables contains the followingelds:
Prole Name — Contains a list of user-dened authentication prole lists to which user-dened authentication proles
are added.
Methods Denes the user authentication methods. The possible eld values are:
None Assigns no authentication method to the authentication prole.
Local Authenticates the user at the device level. The device checks the user name and password for authentication.
RADIUS Authenticates the user at the RADIUS server. For more information, see Dening RADIUS Server Settings.
Line Authenticates the user using a line password.
Enable Authenticates the user using an enable password.
Remove Removes the selected authentication prole. The possible eld values are:
Checked Removes the selected authentication prole.
Unchecked Maintains the authentication proles.
2. Click . The Add Authentication Prole Page opens.
Figure 30: Add Authentication Prole Page
3. Dene the Prole Method and enter the Prole Name
elds.
4. Select the Authentication Method using the move arrow
.
5. Click
. The authentication profile is defined,
and the device is updated.
To modify an authentication prole:
1. Click System > Management Security > Authentication > Authentication Proles. The Authentication Proles Page
opens.
2. Click . The Authentication Prole Settings Page opens:
Figure 31: Authentication Prole Settings Page
3. Select the Authentication Method using the move arrow
.
4. Click . The authentication method is selected,
and the device is updated.
5.1.1.4 Mapping Authentication Proles
After authentication proles are dened, they can be applied to management access methods. For example, console users
can be authenticated by Authentication Prole List 1, while Telnet users are authenticated by Authentication Method List 2.
Authentication methods are selected using arrows. The order in which the methods are selected is the order by which the
authentication methods are used.
To map authentication methods:
1. Click System > Management Security > Authentication > Authentication Mapping. The Authentication Mapping
Page opens: