Allied Telesis AT-8000S 사용자 설명서

다운로드
페이지 188
Configuring Device Security
Configuring Management Security
Page 37
Mapping Authentication Profiles
After authentication profiles are defined, they can be applied to management access methods. For example, 
console users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by 
Authentication Profile List 2. Authentication methods are selected using arrows. The order in which the methods 
are selected is the order by which the authentication methods are used.
To map authentication methods:
1.
Click Mgmt. Security > Authentication Mapping. The Authentication Mapping Page opens:
Figure 19: Authentication Mapping Page
Authentication Login and Enable 
Secure HTTP 
HTTP 
The Authentication Mapping Page contains the following fields:
Console — Indicates that authentication profiles are used to authenticate console users.
Telnet — Indicates that authentication profiles are used to authenticate Telnet users.
Secure Telnet (SSH) — Indicates that authentication profiles are used to authenticate Secure Shell (SSH) 
users. SSH provides clients secure and encrypted remote connections to a device. 
Secure HTTP — Indicates that authentication methods are used for secure HTTP access. The possible 
methods are:
Local — Authentication occurs locally.
RADIUS — Authenticates the user at the RADIUS server.
TACACS+ — Authenticates the user at the TACACS+ server.