39
Authentication Method can be set to one of the following values:
none : authentication is disabled and login is not possible.
local : use the local user database on the switch for authentication.
radius : use a remote RADIUS server for authentication.
tacacs+ : use a remote TACACS+ server for authentication.
Methods that involves remote servers are timed out if the remote servers are offline.
In this case the next method is tried. Each method is tried from left to right and
continues until a method either approves or rejects a user. If a remote server is used
for primary authentication it is recommended to configure secondary
authentication as 'local'. This will enable the management client to login via the
local user database if none of the configured authentication servers are alive.
Buttons:
Apply – Click to save changes.
Reset- Click to undo any changes made locally and revert to previously saved
values.
2-5.1.4 SSH
This section shows you to use SSH (Secure SHell) to securely access the Switch. SSH is
a secure communication protocol that combines authentication and data encryption
to provide secure encrypted communication.
Web Interface
To configure a SSH Configuration in the web interface:
1. Select “Enabled” in the Mode of SSH Configuration.
2. Click Apply.
Figure 2-5.1.4: The SSH Configuration