
SecureStack C3 Configuration Guide
26-1
26
Authentication and Authorization
Configuration
This
chapter
describes
the
following
authentication
and
authorization
commands
and
how
to
use
them.
For
information
about
using
the
authentication
method
for
management,
see
Chapter 27
,
Configuration
.
Overview of Authentication and Authorization Methods
The
following
methods
are
available
for
controlling
which
users
are
allowed
to
access,
monitor,
and
manage
the
switch.
•
Login
user
accounts
and
passwords
–
used
to
log
in
to
the
CLI
via
a
Telnet
connection
or
local
COM
port
connection.
For
details,
refer
to
“
Setting
User
Accounts
and
Passwords
”
on
page 3
‐
2.
•
Host
Access
Control
Authentication
(HACA)
–
authenticates
user
access
of
Telnet
management,
console
local
management
and
WebView
via
a
central
RADIUS
Client/Server
or
For information about...
Refer to page...
Overview of Authentication and Authorization Methods
26-1
Setting the Authentication Login Method
26-4
Configuring RADIUS
26-6
Configuring 802.1X Authentication
26-15
Configuring MAC Authentication
26-25
Configuring Multiple Authentication Methods
26-37
Configuring User + IP Phone Authentication
26-48
Configuring VLAN Authorization (RFC 3580)
26-49
Configuring Policy Maptable Response
26-52
Configuring MAC Locking
26-57
Configuring Port Web Authentication (PWA)
26-68
Configuring Secure Shell (SSH)
26-80
Configuring Access Lists
26-82
Note:
An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
http://www.enterasys.com/support/manuals/
Summary of Contents for SECURESTACK C3
Page 2: ......
Page 34: ...xxxii...
Page 40: ...Getting Help xxxviii About This Guide...
Page 126: ...clear license 4 6 Activating Licensed Features...
Page 132: ...set port inlinepower 5 6 Configuring System Power and PoE...
Page 228: ...clear port protected name 7 60 Port Configuration...
Page 270: ...clear snmp interface 8 42 SNMP Configuration...
Page 396: ...clear port txq 12 10 Port Priority Configuration...
Page 414: ...ip igmp robustness 13 18 IGMP Configuration...
Page 542: ...clear arpinspection statistics 17 32 DHCP Snooping and Dynamic ARP Inspection...
Page 546: ...Enabling Router Configuration Modes 18 4 Preparing for Router Mode...
Page 640: ...traceroute ipv6 21 10 IPv6 Management...
Page 698: ...show ipv6 dhcp binding 24 20 DHCPv6 Configuration...
Page 746: ...show ipv6 ospf virtual link 25 48 OSPFv3 Configuration...
Page 834: ...ip access group 26 88 Authentication and Authorization Configuration...
Page 848: ...TACACS Configuration clear tacacs interface 27 14...
Page 866: ...sFlow Configuration show sflow agent 28 18...
Page 872: ...Index 4...