Network Login
ExtremeWare 7.2e Installation and User Guide
153
Authentication Methods
The authentication methods supported are a matter between the supplicant and the authentication
server. The most commonly used methods are:
•
MD5-Challenge.
•
Transport Layer Security (TLS), which uses Public Key Infrastructure (PKI) and strong mutual
authentication.
•
Tunneled TLS (TTLS), which is a Funk/Certicom proposal.
TLS represents the most secure protocol among these methods. TTLS is advertised to be as strong as
TLS. Both TLS and TTLS are certificate-based, which requires setting up a PKI that can issue, renew, and
revoke certificates. TTLS offers ease of deployment because it requires only server certificates and the
client can use the MD5 mode of username/password authentication.
For information on setting up a PKI configuration, refer to the documentation for your particular
RADIUS server and 802.1x client, if using 802.1x authentication.
Modes of Operation
Network login has two modes of operation:
•
Campus mode
•
ISP mode
Campus Mode
Campus mode is meant for mobile users who tend to move from one port to another and connect at
various locations in the network. In Campus mode, the authenticated port is moved from a temporary
VLAN to a permanent VLAN, which then has access to external network resources. Campus mode
requires the use of a RADIUS server as part of the authentication process.
ISP Mode
ISP mode is meant for users who will connect through the same port and VLAN each time, as though
the switch functions as an ISP. In ISP mode, the port and VLAN remain constant. Before the supplicant
is authenticated, the port is in an unauthenticated state. Once authenticated, the port will forward
packets.
User Accounts
You can create two types of user accounts for authenticating Network Login users:
•
netlogin-only enabled
•
netlogin-only disabled
Netlogin-Only Enabled
A netlogin-only enabled user can only log in using Network Login and cannot access the switch using
the same login.
Summary of Contents for ExtremeWare 7.2e
Page 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Page 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Page 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Page 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Page 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Page 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Page 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Page 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Page 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Page 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Page 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Page 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Page 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...