C
HAPTER
14
| Security Measures
AAA Authorization and Accounting
– 260 –
◆
DHCP Snooping
– Filter IP traffic on insecure ports for which the source
address cannot be identified via DHCP snooping.
N
OTE
:
The priority of execution for the filtering commands is Port Security,
Port Authentication, Network Access, Web Authentication, Access Control
Lists, IP Source Guard, and then DHCP Snooping.
AAA A
UTHORIZATION AND
A
CCOUNTING
The Authentication, authorization, and accounting (AAA) feature provides
the main framework for configuring access control on the switch. The three
security functions can be summarized as follows:
◆
Authentication — Identifies users that request access to the network.
◆
Authorization — Determines if users can access specific services.
◆
Accounting — Provides reports, auditing, and billing for services that
users have accessed on the network.
The AAA functions require the use of configured RADIUS or
servers in the network. The security servers can be defined as sequential
groups that are applied as a method for controlling user access to specified
services. For example, when the switch attempts to authenticate a user, a
request is sent to the first server in the defined group, if there is no
response the second server will be tried, and so on. If at any point a pass
or fail is returned, the process stops.
The switch supports the following AAA features:
◆
Accounting for IEEE 802.1X authenticated users that access the
network through the switch.
◆
Accounting for users that access management interfaces on the switch
through the console and Telnet.
◆
Accounting for commands that users enter at specific CLI privilege
levels.
◆
Authorization of users that access management interfaces on the
switch through the console and Telnet.
To configure AAA on the switch, you need to follow this general process:
1.
Configure RADIUS and server access parameters. See
"Configuring Local/Remote Logon Authentication" on page 261
.
2.
Define RADIUS and server groups to support the accounting
and authorization of services.
Summary of Contents for LGB6026A
Page 6: ...ABOUT THIS GUIDE 4...
Page 40: ...38 CONTENTS...
Page 60: ...58 SECTION I Getting Started...
Page 86: ...84 SECTION II Web Configuration Unicast Routing on page 517 Multicast Routing on page 575...
Page 162: ...160 CHAPTER 5 Interface Configuration VLAN Trunking...
Page 196: ...194 CHAPTER 6 VLAN Configuration Configuring MAC based VLANs...
Page 204: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 202...
Page 238: ...CHAPTER 11 Class of Service Layer 2 Queue Settings 236...
Page 254: ...252 CHAPTER 12 Quality of Service Attaching a Policy Map to a Port...
Page 448: ...446 CHAPTER 16 Multicast Filtering Multicast VLAN Registration...
Page 470: ...468 CHAPTER 17 IP Configuration Setting the Switch s IP Address IP Version 6...
Page 576: ...574 CHAPTER 21 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2...
Page 606: ...604 CHAPTER 22 Multicast Routing Configuring PIMv6 for IPv6...
Page 620: ...618 CHAPTER 23 Using the Command Line Interface CLI Command Groups...
Page 672: ...670 CHAPTER 25 System Management Commands Time Range...
Page 692: ...690 CHAPTER 26 SNMP Commands...
Page 700: ...698 CHAPTER 27 Remote Monitoring Commands...
Page 854: ...CHAPTER 34 Port Mirroring Commands Local Port Mirroring Commands 852...
Page 862: ...860 CHAPTER 36 Address Table Commands...
Page 958: ...956 CHAPTER 40 Quality of Service Commands...
Page 1034: ...1032 CHAPTER 42 LLDP Commands...
Page 1044: ...1042 CHAPTER 43 Domain Name Service Commands...
Page 1062: ...1060 CHAPTER 44 DHCP Commands DHCP Server...
Page 1206: ...CHAPTER 47 IP Routing Commands Open Shortest Path First OSPFv3 1204...
Page 1250: ...1248 SECTION IV Appendices...
Page 1256: ...1254 APPENDIX A Software Specifications Management Information Bases...
Page 1278: ...1276 COMMAND LIST...