Table of Contents

User authentication

Local users

The Authentication > Users page allows users logged in as administrators to add new users or edit existing users and their privilege levels. Depending on the selected role, the user has the following privileges:

The minimum requirements for the passwords are as follows:

TACACS+

The Authentication > TACACS+ page allows adding up to three TACACS+ servers, and configuring the following details:

RADIUS

The Authentication > RADIUS page allows adding up to three RADIUS servers, and configuring the following details:

LDAP and LDAPS

The Authentication > LDAP page offers the possibility to configure one or more LDAP servers for user authentication. In order to set up the LDAP access, the following settings are required:

Supervisor

Profitap Supervisor can be used as a centralized authentication facility for all XX-Series and X2-Series packet brokers.

This feature can be enabled in the Supervisor when registering the device. The centralized manager will automatically register in the device as an authentication facility. From this moment on, the device will query the Supervisor to verify, using its authentication configuration, if the credentials used for login are valid. This feature allows the user to define the whole authentication configuration for all Profitap NPBs in a single point and have it being used across the whole fleet of packet brokers.

On the Authentication > Profitap Supervisor page, it is possible to visualize if any Supervisor has been registered with the device and eventually modify the address, port and registration token. Note that the Supervisor is already performing the registration process automatically and these settings shouldn't require any manual change.

When disabling the Profitap Supervisor from this GUI, the device will stop reaching to the Supervisor for authentication.

Authentication methods priorities

XX-Series and X2-Series allow users to not only define multiple authentication methods, but also to configure how the different methods are used by the device. Clicking the Configure Authentication button on any tab of the Authentication page allows users to see the list of available authentication methods and change their priority and activation strategy.

For each method, one of the following strategies can be selected:

All authentication methods and their configured priority and activation strategy apply to all login methods: Serial CLI, SSH CLI, GUI, HTTPS RestAPI, and Ansible.