5-25
Authentication
How Authentication Operates
3.
After the server receives the username input, the requesting terminal
receives a password prompt from the server via the switch.
4.
When the requesting terminal responds to the prompt with a password,
the switch forwards it to the server and one of the following
actions occurs:
•
If the username/password pair received from the requesting
terminal matches a username/password pair previously stored in
the server, then the server passes access permission through the
switch to the terminal.
•
If the username/password pair entered at the requesting terminal
does not match a username/password pair previously stored in
the server, access is denied. In this case, the terminal is again
prompted to enter a username and repeat steps 2 through 4. In
the default configuration, the switch allows up to three attempts
to authenticate a login session. If the requesting terminal
exhausts the attempt limit without a successful
authentication, the login session is terminated and the operator
at the requesting terminal must initiate a new session before
trying again.
Local Authentication Process
When the switch is configured to use , it reverts to local authentica-
tion only if one of these two conditions exists:
■
“Local” is the authentication option for the access method being used.
■
is the primary authentication mode for the access method
being used. However, the switch was unable to connect to any
servers (or no servers were configured) AND
Local
is the
secondary authentication mode being used.
(For a listing of authentication options, see table 5-2, “Primary/Secondary
Authentication Table” on 5-15.)
For local authentication, the switch uses the operator-level and manager-level
username/password set(s) previously configured locally on the switch. (These
are the usernames and passwords you can configure using the CLI password
command, the WebAgent, or the menu interface—which enables only local
password configuration).
■
If the operator at the requesting terminal correctly enters the user-
name/password pair for either access level, access is granted.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......