452
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
Authentication Rule Requirements
Bonded authentication requires an 802.1X authentication rule for the
machine itself, and a separate 802.1X authentication rule for the user(s).
Use the
bonded
option in the user authentication rule, but not in the
machine authentication rule.
The authentication rule for the machine must be higher up in the list of
authentication rules than the authentication rule for the user.
You must use 802.1X authentication rules. The 802.1X authentication
rule for the machine must use
pass-through
as the protocol. 3Com
recommends that you also use
pass-through
for the user authentication
rule.
The rule for the machine and the rule for the user must use a RADIUS
server group as the method. (Generally, in a bonded authentication
configuration, the RADIUS servers will use a user database stored on an
Active Directory server.)
(For a configuration example, see “Bonded Auth Configuration Example”
on page 454.)
3Com recommends that you make the rules as general as possible. For
example, if the Active Directory domain is mycorp.com, the following
userglobs match on all machine names and users in the domain:
host/*.mycorp.com (userglob for the machine authentication rule)
*.mycorp.com (userglob for the user authentication rule)
If the domain name has more nodes (for example, nl.mycorp.com), use
an asterisk in each node that you want to match globally. For example, to
match on all machines and users in mycorp.com, use the following
userglobs:
host/*.*.mycorp.com (userglob for the machine authentication rule)
*.*.mycorp.com (userglob for the user authentication rule)
Use more specific rules to direct machines and users to different server
groups. For example, to direct users in nl.mycorp.com to a different
server group than users in de.mycorp.com, use the following userglobs:
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...