TP-Link TL-SG3109, TL-SL3452 Mapping Authentication Profiles, Add Authentication Profile Page

Models: TL-SG3109 TL-SL3428 TL-SL3452

1 120
Download 120 pages 18.36 Kb
Page 32
Image 32
2.Click . The Add Authentication Profile Page opens.

Each of the tables contains the following fields:

Profile Name — Contains a list of user-defined authentication profile lists to which user-defined authentication profiles are added.

Methods — Defines the user authentication methods. The possible field values are:

None — Assigns no authentication method to the authentication profile.

Local — Authenticates the user at the device level. The device checks the user name and password for authentication.

RADIUS — Authenticates the user at the RADIUS server. For more information, see Defining RADIUS Server Settings.

Line — Authenticates the user using a line password.

Enable — Authenticates the user using an enable password.

Remove — Removes the selected authentication profile. The possible field values are:

Checked — Removes the selected authentication profile.

Unchecked — Maintains the authentication profiles.

2.Click Figure 30: Add Authentication Profile Page. The Add Authentication Profile Page opens.

Figure 30: Add Authentication Profile Page

3.Define the Profile Method and enter the Profile Name fields.

4.Select the Authentication Method using the move arrow

3.Define the Profile Method and enter the Profile Name fields..

5.Click 2.Click . The Authentication Profile Settings Page opens:. The authentication profile is defined, and the device is updated.

To modify an authentication profile:

1.Click System > Management Security > Authentication > Authentication Profiles. The Authentication Profiles Page opens.

2.Click Figure 31: Authentication Profile Settings Page. The Authentication Profile Settings Page opens:

Figure 31: Authentication Profile Settings Page

3.Select the Authentication Method using the move arrow

5.1.1.4 Mapping Authentication Profiles.

4.Click Manual background. The authentication method is selected, and the device is updated.

5.1.1.4 Mapping Authentication Profiles

After authentication profiles are defined, they can be applied to management access methods. For example, console users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authentication Method List 2. Authentication methods are selected using arrows. The order in which the methods are selected is the order by which the authentication methods are used.

To map authentication methods:

1.Click System > Management Security > Authentication > Authentication Mapping. The Authentication Mapping Page opens:

2 5

Page 32
Image 32
TP-Link TL-SG3109, TL-SL3452, TL-SL3428 Mapping Authentication Profiles, Click . The Add Authentication Profile Page opens