What is Switch Management Login?
79
Figure 20
RADIUS Authentication Operation
Important
Considerations
This section contains some important considerations when using RADIUS
authentication of Switch Management Login on the Switch 3226 and
Switch 3250.
■
Before you enable RADIUS authentication you must ensure that:
■
The Switch is configured with a static IP address.
■
RADIUS has been configured on the Switch.
■
The RADIUS server in your network is operational.
■
If the Switch is unable to contact the RADIUS server, the Command
Line Interface automatically reverts to using the local Switch database
for user authentication. This allows a user with “admin” access to
login to the Switch via the console port and continue to manage it.
The Web interface and Telnet do not revert to the local database, and
the user will not be able to log in to the Switch via the Web interface
or Telnet.
■
The user names and passwords stored in the local Switch database
may not be the same as those stored on the RADIUS server. When a
user account is created on a RADIUS server, an equivalent account is
not automatically created in the local Switch database, and vice versa.
Switch
Management
Device
1. User name and
password submitted
2. Username and
password encrypted
RADIUS Server
3. Accept or
reject response
4. User logs in or
denied access
Summary of Contents for 3CR17501-91 - SuperStack 3 Switch 3250
Page 8: ......
Page 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW ...
Page 43: ...How STP Works 43 Figure 9 STP configurations ...
Page 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT ...
Page 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS ...
Page 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION ...
Page 98: ...98 CHAPTER 11 IP ROUTING ...
Page 102: ...102 APPENDIX A CONFIGURATION RULES ...
Page 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES ...
Page 132: ...132 INDEX ...