User Guide

Configuring authentication for console server logins
The default authentication method for the console server is Local. You can either accept the
default or select another authentication method from the Unit Authentication pull-down menu
on the AuthType form.
Any authentication method selected for the console server is used for authentication of any user
attempting to log into the console server through Telnet, SSH or the web manager.
To configure the console server's login authentication method:
1. Go to Security - Authentication. The AuthType form is displayed.
2. To specify an authentication method for login to the console server, select a method from
the Unit Authentication pull-down menu.
NOTE: Make sure an authentication server is specified for the selected authentication type.
3. Click apply changes.
Configuring authentication servers for logins to the console server and connected
devices
If you are configuring any authentication method other than Local, make sure an authentication
server is set up for that method.
The following is a summary of the things you need to know about setting up authentication
servers.
The console server must be on the same subnet as the authentication server.
Each authentication server must be configured and operational.
The console server administrator should obtain the necessary information from each
authentication server administrator, in order set up and identify those servers on the console
server.
For example, if LDAP authentication were to be used for logins to the console server and
Kerberos for logins to serial ports, then the console server needs to have network access to an
LDAP and a Kerberos authentication server. The administrator needs to perform setup on the
console server for both types of authentication servers.
The administrator completes the appropriate form through the web manager Expert - Security -
Authentication to set up an authentication server for every authentication method to be used by
the console server and its ports.
The following table lists the procedures that apply to each authentication method.
Chapter 8: Security Menu and Forms 93