12 Contents9 Controlling Management Access . . . . . 169Management Access Control Overview . . . . . . . . 169What Are the Recommendations forManagement Security? . . . . . . . . . . . . . . 171What Is an Authentication Profile? . . . . . . . . 171How Does TACACS+ Control ManagementAccess? . . . . . . . . . . . . . . . . . . . . . . 172How Does RADIUS Control ManagementAccess? . . . . . . . . . . . . . . . . . . . . . . 174What are RADIUS Server Groups? . . . . . . . . 176How Does the Switch Determine WhichRADIUS Server to Contact?. . . . . . . . . . . . 176What Other Features Use Authentication? . . . . 178Default Management Security Values . . . . . . . . . 178Controlling Management Access (Web) . . . . . . . 180Access Profile . . . . . . . . . . . . . . . . . . 180Authentication Profiles . . . . . . . . . . . . . . 184Select Authentication. . . . . . . . . . . . . . . 187Password Management . . . . . . . . . . . . . 188Last Password Set Result. . . . . . . . . . . . . 190User Login Configuration . . . . . . . . . . . . . 191Local User Database . . . . . . . . . . . . . . . 192Line Password . . . . . . . . . . . . . . . . . . 194Enable Password . . . . . . . . . . . . . . . . . 194TACACS+ Settings . . . . . . . . . . . . . . . . 195RADIUS Global Configuration. . . . . . . . . . . 197RADIUS Server Configuration . . . . . . . . . . 198RADIUS Accounting Server Configuration . . . . 200RADIUS Accounting Server Statistics . . . . . . 202RADIUS Server Statistics . . . . . . . . . . . . . 203Authorization Network RADIUS . . . . . . . . . 204Telnet Server . . . . . . . . . . . . . . . . . . . 205Denial of Service . . . . . . . . . . . . . . . . . 206