5-2
RADIUS Authentication, Authorization and Accounting
Overview
Overview
RADIUS (
Remote Authentication Dial-In User Service
) enables you to use
up to three servers (one primary server and one or two backups) and maintain
separate authentication and accounting for each RADIUS server employed.
For authentication, this allows a different password for each user instead of
having to rely on maintaining and distributing switch-specific passwords to
all users. For accounting, this can help you track network resource usage.
Authentication.
You can use RADIUS to verify user identity for the follow-
ing types of primary password access to the ProCurve switch:
■
Serial port (Console)
■
Telnet
■
SSH
■
Web
■
Port-Access
N o t e
The switch does not support RADIUS security for SNMP (network manage-
ment) access. For information on blocking unauthorized access through the
web browser interface, refer to “Controlling Web Browser Interface Access
When Using RADIUS Authentication” on page 5-17.
Accounting.
RADIUS accounting on the switch collects resource consump-
tion data and forwards it to the RADIUS server. This data can be used for trend
analysis, capacity planning, billing, auditing, and cost analysis.
Feature
Default
Menu
CLI
Web
Configuring RADIUS Authentication
None
n/a
5-6
n/a
Configuring RADIUS Accounting
None
n/a
5-25
n/a
Viewing RADIUS Statistics
n/a
n/a
5-33
n/a
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......