EasyManua.ls Logo

Transition Networks SM8TAT2SA - Auth Method

Transition Networks SM8TAT2SA
248 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
12-1.3 Auth Method
The Security > Management > Auth Method menu path displays the Auth Method Configuration
tables, where you can configure an authentication method (none, local, or radius) for each client (telnet,
ssh, http, https). You can also configure a service port number for telnet, ssh, http, and https clients,
and enable the HTTPS Redirect function on this page. The page also provides the Command
Authorization Method Configuration table and the Accounting Method Configuration table.
Section descriptions:
Authentication Method Configuration: The authentication section allows you to configure how a
user is authenticated when he logs into the switch via one of the management client interfaces. The
table has one row for each client type and a number of columns.
Command Authorization Method Configuration: The command authorization section allows you to
limit the CLI commands available to a user. The table has one row for each client type and a number of
columns.
Accounting Method Configuration: The accounting section allows you to configure command and
exec (login) accounting. The table has one row for each client type and a number of columns,
Parameter descriptions:
Methods: Select an authentication method (none, local, radius, or tacacs) for each client (telnet, ssh,
http, https). In the Command Authorization Method Configuration table and the Accounting Method
Configuration table, select a Method for telnet or ssh only (none or tacacs). The Method can be set to
one of the following values:
none: Authentication is disabled and login is not possible.
local: Use the local user database on the switch for authentication.
radius: Use remote RADIUS server(s) for authentication. Remote Authentication Dial In User Service
is a networking protocol that provides centralized access, authorization and accounting management
for people or computers to connect and use a network service.

Table of Contents

Related product manuals