![Edge-Core Direk Tronik 24/48-Port Management Manual Download Page 121](http://html1.mh-extra.com/html/edge-core/direk-tronik-24-48-port/direk-tronik-24-48-port_management-manual_2359667121.webp)
Configuring Local/Remote Logon Authentication
12-3
12
RADIUS uses UDP while uses TCP. UDP only offers best effort delivery,
while TCP offers a connection-oriented transport. Also, note that RADIUS encrypts
only the password in the access-request packet from the client to the server, while
encrypts the entire body of the packet.
Command Usage
• By default, management access is always checked against the authentication
database stored on the local switch. If a remote authentication server is used, you
must specify the authentication sequence and the corresponding parameters for
the remote authentication protocol. Local and remote logon authentication control
management access via the console port, web browser, or Telnet.
• RADIUS and logon authentication assign a specific privilege level for
each user name/password pair. The user name, password, and privilege level
must be configured on the authentication server.
• You can specify up to three authentication methods for any user to indicate the
authentication sequence. For example, if you select (1) RADIUS, (2) TACACS and
(3) Local, the user name and password on the RADIUS server is verified first. If the
RADIUS server is not available, then authentication is attempted using the
server, and finally the local user name and password is checked.
Command Attributes
•
Authentication
– Select the authentication, or authentication sequence required:
-
Local
– User authentication is performed only locally by the switch.
-
Radius
– User authentication is performed using a RADIUS server only.
-
TACACS
– User authentication is performed using a server only.
- [authentication sequence] – User authentication is performed by up to three
authentication methods in the indicated sequence.
• RADIUS Settings
-
Global
– Provides globally applicable RADIUS settings.
Web
Telnet
RADIUS/
server
console
1. Client attempts management access.
2. Switch contacts authentication server.
3. Authentication server challenges client.
4. Client responds with proper password or key.
5. Authentication server approves access.
6. Switch grants management access.
Summary of Contents for Direk Tronik 24/48-Port
Page 2: ......
Page 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Page 22: ...xxii Tables...
Page 26: ...xxvi Figures...
Page 28: ...Getting Started...
Page 50: ...Initial Configuration 2 14 2...
Page 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Page 68: ...Basic System Settings 4 8 4...
Page 118: ...Simple Network Management Protocol 11 18 11...
Page 142: ...Configuring 802 1X Port Authentication 14 8 14...
Page 154: ...Access Control Lists 15 12 15...
Page 232: ...Configuring Protocol Based VLANs 25 4 25...
Page 252: ...Quality of Service 27 8 27...
Page 282: ...Using the Command Line Interface 31 10 31...
Page 290: ...General Commands 33 6 33...
Page 300: ...System Management Commands 34 10 34...
Page 308: ...File Management Commands 35 8 35...
Page 326: ...Event Logging Commands 37 8 37...
Page 336: ...Time Commands 39 6 39...
Page 406: ...Access Control List Commands 44 18 44...
Page 418: ...Interface Commands 45 12 45...
Page 432: ...Broadcast Storm Control Commands 47 2 47...
Page 436: ...Rate Limit Commands 49 2 49...
Page 478: ...VLAN Commands 52 18 52...
Page 508: ...Quality of Service Commands 56 10 56...
Page 518: ...Multicast Filtering Commands 57 10 57...
Page 532: ...IPv4 Interface Commands 59 6 59...
Page 560: ...IPv6 Interface Commands 60 28 60...
Page 566: ...Switch Cluster Commands 61 6 61...
Page 568: ...Appendices...
Page 582: ...Glossary Glossary 8...
Page 587: ......
Page 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...