SX II requires users be authenticated to access the appliance.
Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed. This is called authorization.
Users can be authenticated via SX II locally or remotely.
By default, users are authenticated locally; you must enable remote authentication.
When the SX II is configured for remote authentication, the external authentication server is used primarily for the purposes of authentication, not authorization.
SX II provides several options to remotely authenticate users -
For information on configuring LDAP, RADIUS and TACACS+ servers, see Configure LDAP, RADIUS and TACACS+ Servers.
For information on enabling Telnet and SSH in SX II, see Enable Telnet (Optional) and Enable SSH Access (Optional).
Note: You can also configure remote authentication via command line interface. See Configure User Authorization and Authentication Services Using CLI.