![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/4/4b/44bbcbb6-ae84-4e68-903e-d58edd0f15bd/44bbcbb6-ae84-4e68-903e-d58edd0f15bd-bgb6.png)
182 Configuring System Information
The Select Authentication page contains the following fields:
•
Console
— Authentication profiles used to authenticate console users.
•
Telnet
— Authentication profiles used to authenticate Telnet users.
•
Secure Telnet (SSH
) — Authentication profiles used to authenticate Secure Shell (SSH) users.
SSH
provides clients with secure and encrypted remote connections to a device.
•
Secure HTTP
and
HTTP
— Authentication method used for Secure HTTP access and HTTP access,
respectively. Possible field values are:
–
Local
— Authentication occurs locally.
–
None
— No authentication method is used for access.
–
RADIUS
— Authentication occurs at the RADIUS server.
–
TACACS+
— Authentication occurs at the TACACS+ server.
Applying an Authentication List to Console Sessions
1
Open the
Select Authentication
page.
2
Select an Authentication Profile in the
Console
field.
3
Click
Apply Changes
.
Console sessions are assigned an Authentication List.
Applying an Authentication Profile to Telnet Sessions
1
Open the
Select Authentication
page.
2
Select an Authentication Profile in the
Telnet
field.
3
Click
Apply Changes
.
Telnet sessions are assigned an Authentication List.
Applying an Authentication Profile to Secure Telnet (SSH) Sessions
1
Open the
Select Authentication
page.
2
Select an Authentication Profile in the
Secure Telnet (SSH)
field.
3
Click
Apply Changes
.
Secure Telnet (SSH) sessions are assigned an Authentication Profile.
Assigning HTTP Sessions an Authentication Sequence
1
Open the
Select Authentication
page.
2
Select an authentication sequence in the
HTTP
field.
3
Click
Apply Changes
.
HTTP sessions are assigned an authentication sequence.