Configuring Security
Access Profiles
Cisco Small Business 300 Series Managed Switch Administration Guide 201
16
• RADIUS—User is authenticated on a RADIUS server. You must have
configured one or more RADIUS servers.
• TAC AC S+ —User authenticated on the TACACS+ server. You must have
configured one or more TACACS+ servers.
• None—User is allowed to access the switch without authentication.
• Local—Username and password is checked against the data stored on the
local switch. These username and password pairs are defined in the User
Accounts Page.
NOTE The Local or None authentication method must always be
selected last. All authentication methods selected after Local or None
are ignored.
STEP 4 Click Apply. The selected authentication methods are associated with the access
method.
Access Profiles
Management Access Authentication configures the authentication methods to be
used to authenticate and authorize users from different management access
methods. Management Access Profiles limit management access from specific
interfaces and/or sources.
Only users who pass both the active access profile and management access
authentication are given management access to the switch.
Access Profile Rules, Filters, and Elements
Access profiles consist of rules for allowing access to the switch. Each access
profile can consist of one or more rules. The rules are executed in order of their
priority within the access profile (top to bottom).
Rules are composed of filters that include the following elements:
• Access Methods—Methods for accessing and managing the switch:
- Te l n e t
- Secure Telnet (SSH)
- Hypertext Transfer Protocol (HTTP)