Configuring Device Security
Defining Authentication
ESW 500 Series Switches Administration Guide 115
Mapping Authentication ProfilesAfter authentication profiles are defined, authentication profiles can be applied to
management access methods. For example, console users can be authenticated
by one authentication profile, while Telnet users are authenticated by another
authentication profile.
Authentication methods are selected using arrows. The order in which the
methods are selected is the order by which the authentication methods are used.
The
Mapping Profiles Page
contains parameters for mapping authentication
methods. To map authentication profiles:
STEP1 Click Security > Authentication > Mapping Profiles. The
Mapping Profiles Page
opens:
Mapping Profiles Page
The
Mapping Profiles Page
contains the following fields:
•Console — Indicates that Authentication profiles are used to authenticate
console users.
•Tel ne t — Indicates that Authentication profiles are used to authenticate Telnet
users.