Chapter 12
| Security Measures
AAA (Authentication, Authorization and Accounting)
– 224 –
Note:
The priority of execution for the filtering commands is Port Security, Port
Authentication, Network Access, Web Authentication, Access Control Lists, IP
Source Guard, and then DHCP Snooping.
AAA (Authentication, Authorization and Accounting)
The authentication, authorization, and accounting (AAA) feature provides the main
framework for configuring access control on the switch. The three security
functions can be summarized as follows:
◆
Authentication — Identifies users that request access to the network.
◆
Authorization — Determines if users can access specific services.
◆
Accounting — Provides reports, auditing, and billing for services that users
have accessed on the network.
The AAA functions require the use of configured RADIUS or servers in the
network. The security servers can be defined as sequential groups that are applied
as a method for controlling user access to specified services. For example, when the
switch attempts to authenticate a user, a request is sent to the first server in the
defined group, if there is no response the second server will be tried, and so on. If at
any point a pass or fail is returned, the process stops.
The switch supports the following AAA features:
◆
Accounting for IEEE 802.1X authenticated users that access the network
through the switch.
◆
Accounting for users that access management interfaces on the switch through
the console and Telnet.
◆
Accounting for commands that users enter at specific CLI privilege levels.
◆
Authorization of users that access management interfaces on the switch
through the console and Telnet.
To configure AAA on the switch, you need to follow this general process:
1.
Configure RADIUS and server access parameters. See
Local/Remote Logon Authentication” on page 225
.
2.
Define RADIUS and server groups to support the accounting and
authorization of services.
Summary of Contents for GEL-1061
Page 14: ...Contents 14...
Page 28: ...Section I Getting Started 28...
Page 38: ...Chapter 1 Introduction System Defaults 38...
Page 40: ...Section II Web Configuration 40...
Page 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Page 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Page 192: ...Chapter 8 Congestion Control Storm Control 192...
Page 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Page 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Page 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Page 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Page 474: ...Section III Appendices 474...
Page 492: ...Glossary 492...
Page 500: ...E052016 ST R02 150200001416A...