18
STEP 1
STEP 2
STEP 3
STEP 4
Secure Sensitive Data Management
348
If an authentication method fails or the user has insufficient privilege level, the user
is denied access to the device. In other words, if authentication fails at an
authentication method, the device stops the authentication attempt; it does not
continue and does not attempt to use the next authentication method.
To define authentication methods for an access method:
Click Security > Management Access Authentication.
Select an access method from the Application list.
Use the arrows to move the authentication method between the Optional Methods
column and the Selected Methods column. The first method selected is the first
method that is used.
•
RADIUS—User is authenticated on a RADIUS server. You must have
configured one or more RADIUS servers.
•
TACACS+—User authenticated on the TACACS+ server. You must have
configured one or more TACACS+ servers.
•
None—User is allowed to access the device without authentication.
•
Local—Username and password are checked against the data stored on the
local device. These username and password pairs are defined in the User
Accounts page.
The Local or None authentication method must always be
NOTE
selected last. All authentication methods selected after Local or None
are ignored.
Click Apply. The selected authentication methods are associated with the access
method.
See
Security: Secure Sensitive Data
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
Secure Sensitive Data Management
Management.
Security