– 583 –
24
A
UTHENTICATION
C
OMMANDS
You can configure this switch to authenticate users logging into the system
for management access using local or remote authentication methods.
Port-based authentication using IEEE 802.1X can also be configured to
control either management access to the uplink ports or client access
8
to
the data ports.
U
SER
A
CCOUNTS
The basic commands required for management access are listed in this
section. This switch also includes other options for password checking via
the console or a Telnet connection (
page 520
), user authentication via a
remote authentication server (
page 583
), and host access authentication
for specific ports (
page 619
).
8. For other methods of controlling client access, see
"General Security Measures" on
page 637
.
Table 59: Authentication Commands
Command Group
Function
User Accounts
Configures the basic user names and passwords for management
access
Authentication Sequence
Defines logon authentication method and precedence
RADIUS Client
Configures settings for authentication via a RADIUS server
Client
Configures settings for authentication via a server
AAA
Configures authentication, authorization, and accounting for
network access
Web Server
Enables management access via a web browser
Telnet Server
Enables management access via Telnet
Secure Shell
Provides secure replacement for Telnet
802.1X Port
Authentication
Configures host authentication on specific ports using 802.1X
Management IP Filter
Configures IP addresses that are allowed management access
Table 60: User Access Commands
Command
Function
Mode
enable password
Sets a password to control access to the Privileged
Exec level
GC
username
Establishes a user name-based authentication system
at login
GC
Summary of Contents for ES3510MA
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 4: ...ABOUT THIS GUIDE 4...
Page 30: ...CONTENTS 30...
Page 40: ...FIGURES 40...
Page 46: ...TABLES 46...
Page 48: ...SECTION I Getting Started 48...
Page 72: ...SECTION II Web Configuration 72...
Page 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Page 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Page 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Page 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Page 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Page 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Page 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Page 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Page 574: ...CHAPTER 22 SNMP Commands 574...
Page 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Page 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Page 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Page 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Page 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Page 848: ...CHAPTER 36 Quality of Service Commands 848...
Page 900: ...CHAPTER 38 LLDP Commands 900...
Page 910: ...CHAPTER 39 Domain Name Service Commands 910...
Page 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Page 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Page 950: ...SECTION IV Appendices 950...
Page 982: ...INDEX 982...
Page 983: ......