1-10
12) The HWTACACS client sends the user authorization request packet to the HWTACACS server.
13) The HWTACACS server sends back the authorization response, indicating that the user is
authorized now.
14) Knowing that the user is now authorized, the HWTACACS client pushes the configuration interface
of the NAS to the user.
15) The HWTACACS client sends a start-accounting request to the HWTACACS server.
16) The HWTACACS server sends back an accounting response, indicating that it has received the
start-accounting request.
17) The user logs off.
18) The HWTACACS client sends a stop-accounting request to the HWTACACS server.
19) The HWTACACS server sends back a stop-accounting response, indicating that the
stop-accounting request has been received.
Protocols and Standards
The protocols and standards related to AAA, RADIUS, HWTACACS include:
z
RFC 2865: Remote Authentication Dial In User Service (RADIUS)
z
RFC 2866: RADIUS Accounting
z
RFC 2867: RADIUS Accounting Modifications for Tunnel Protocol Support
z
RFC 2868: RADIUS Attributes for Tunnel Protocol Support
z
RFC 2869: RADIUS Extensions
z
RFC 1492: An Access Control Protocol, Sometimes Called TACACS
AAA Configuration Task List
The basic procedure to configure AAA is as follows:
1) Configure the required AAA schemes.
z
Local authentication: Configure local users and related attributes, including usernames and
passwords of the users to be authenticated.
z
Remote authentication: Configure the required RADIUS and/or HWTACACS schemes, and
configure user attributes on the servers accordingly.
2) Configure the AAA methods: Reference the configured AAA schemes in the users’ ISP domains.
z
Authentication method: No authentication (
none
), local authentication (
local
), or remote
authentication (
scheme
)
z
Authorization method: No authorization (
none
) , local authorization (
local
), or remote authorization
(
scheme
)
z
Accounting method: No accounting (
none
), local accounting (
local
), or remote accounting
(
scheme
)
For login users, it is necessary to configure the authentication mode for logging into the user interface
as
scheme
. For detailed information, refer to
Login Configuration
of the
System Volume
.
Summary of Contents for S5500-SI Series
Page 161: ...3 10 GigabitEthernet1 0 1 2 MANUAL...
Page 220: ...1 7 Clearing ARP entries from the ARP table may cause communication failures...
Page 331: ...1 7 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete...
Page 493: ...2 8...
Page 1111: ...1 10 Installing patches Installation completed and patches will continue to run after reboot...