–
236
–
Chapter 12
| Security Measures
AAA (Authentication, Authorization and Accounting)
with invalid MAC to IP Address bindings, which forms the basis for certain
“man
-in-the-
middle” attacks.
Note:
The priority of execution for the filtering commands is Port Security, Port
Authentication, Network Access, Web Authentication, Access Control Lists, IP
Source Guard, and then DHCP Snooping.
AAA (Authentication, Authorization and Accounting)
The authentication, authorization, and accounting (AAA) feature provides the main
framework for configuring access control on the switch. The three security
functions can be summarized as follows:
◆
Authentication
—
Identifies users that request access to the network.
◆
Authorization
—
Determines if users can access specific services.
◆
Accounting
—
Provides reports, auditing, and billing for services that users
have accessed on the network.
The AAA functions require the use of configured RADIUS or servers in the
network. The security servers can be defined as sequential groups that are applied
as a method for controlling user access to specified services. For example, when the
switch attempts to authenticate a user, a request is sent to the first server in the
defined group, if there is no response the second server will be tried, and so on. If at
any point a pass or fail is returned, the process stops.
The switch supports the following AAA features:
◆
Accounting for IEEE 802.1X authenticated users that access the network
through the switch.
◆
Accounting for users that access management interfaces on the switch through
the console and Telnet.
◆
Accounting for commands that users enter at specific CLI privilege levels.
◆
Authorization of users that access management interfaces on the switch
through the console and Telnet.
To configure AAA on the switch, you need to follow this general process:
1.
Configure RADIUS and server access parameters. See
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...