Cisco SR224T Administration Guide - Page 231

Defining Management Access Method, Local, Apply, Access Methods, Action, Interface

Page 231 highlights

Configuring Security Defining Management Access Method 17 • RADIUS-User is authenticated on a RADIUS server. You must have configured one or more RADIUS servers. • None-User is allowed to access the switch without authentication. • Local-Username and password are checked against the data stored on the local switch. These username and password pairs are defined in the User Accounts page. NOTE The Local or None authentication method must always be selected last. All authentication methods selected after Local or None are ignored. STEP 4 Click Apply. The selected authentication methods are associated with the access method. Defining Management Access Method Access profiles determine how to authenticate and authorize users accessing the switch through various access methods. Access Profiles can limit management access from specific sources. Only users who pass both the active access profile and the management access authentication methods are given management access to the switch. There can only be a single access profile active on the switch at one time. Access profiles consist of one or more rules. The rules are executed in order of their priority within the access profile (top to bottom). Rules are composed of filters that include the following elements: • Access Methods-Methods for accessing and managing the switch: - Hypertext Transfer Protocol (HTTP) - Secure HTTP (HTTPS) - All of the above • Action-Permit or deny access to an interface or source address. • Interface-Which ports, LAGs, or VLANs are permitted to access or are denied access to the web-based switch configuration utility. Cisco Small Business 200 Series Smart Switch Administration Guide 232

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283

Configuring Security
Defining Management Access Method
Cisco Small Business 200 Series Smart Switch Administration Guide
232
17
RADIUS
—User is authenticated on a RADIUS server. You must have
configured one or more RADIUS servers.
None
—User is allowed to access the switch without authentication.
Local
—Username and password are checked against the data stored on the
local switch. These username and password pairs are defined in the
User
Accounts
page.
NOTE
The
Local
or
None
authentication method must always be
selected last. All authentication methods selected after
Local
or
None
are ignored.
STEP
4
Click
Apply
. The selected authentication methods are associated with the access
method.
Defining Management Access Method
Access profiles determine how to authenticate and authorize users accessing the
switch through various access methods. Access Profiles can limit management
access from specific sources.
Only users who pass both the active access profile and the management access
authentication methods are given management access to the switch.
There can only be a single access profile active on the switch at one time.
Access profiles consist of one or more rules. The rules are executed in order of
their priority within the access profile (top to bottom).
Rules are composed of filters that include the following elements:
Access Methods
—Methods for accessing and managing the switch:
-
Hypertext Transfer Protocol (HTTP)
-
Secure HTTP (HTTPS)
-
All of the above
Action
—Permit or deny access to an interface or source address.
Interface
—Which ports, LAGs, or VLANs are permitted to access or are
denied access to the web-based switch configuration utility.