Configuring Device Security

Configuring Management Security

Mapping Authentication Methods

After authentication profiles are defined, they can be applied to management access methods. For example, con- sole users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authenti- cation Method List 2.

Authentication methods are selected using arrows. The order in which the methods are selected is the order by which the authentication methods are used.

To map authentication methods:

1.Click System > Management Security > Authentication > Authentication Mapping. The Authentication Mapping Page opens.

Figure 41: Authentication Mapping Page

The Authentication Mapping Page contains the following fields:

Console — Indicates that Authentication profiles are used to authenticate console users.

Telnet — Indicates that Authentication profiles are used to authenticate Telnet users.

Secure Telnet (SSH) — Indicates that Authentication profiles are used to authenticate Secure Shell (SSH) users. SSH provides clients secure and encrypted remote connections to a device.

Secure HTTP — Indicates that Authentication methods used for Secure HTTP access. Possible field values are:

Page 87

Page 88
Image 88
D-Link DWS/DXS-3200 manual Mapping Authentication Methods, Authentication Mapping