Configuring Device Security
Configuring Management Security
Page 38
• Secure HTTP — Indicates that authentication methods are used for secure HTTP access. The possible
methods are:
– Local — Authentication occurs locally.
– RADIUS — Authenticates the user at the RADIUS server.
– TACACS+ — Authenticates the user at the TACACS+ server.
– None — Indicates that no authentication method is used for access.
• HTTP — Indicates that authentication methods are used for HTTP access. Possible methods are:
– Local — Authentication occurs locally.
– RADIUS — Authenticates the user at the RADIUS server.
– TACACS+ — Authenticates the user at the TACACS+ server.
– None — Indicates that no authentication method is used for access.
2. Define the Console, Telnet, and Secure Telnet (SSH) fields.
3. Map the authentication method(s) in the Secure HTTP selection box using the arrow.
4. Map the authentication method(s) in the HTTP selection box.
5. Click Save Config on the menu to save the changes permanently.
Commentaires sur ces manuels