–
237
–
Chapter 12
| Security Measures
AAA (Authentication, Authorization and Accounting)
2.
Define RADIUS and server groups to support the accounting and
authorization of services.
3.
Define a method name for each service to which you want to apply accounting
or authorization and specify the RADIUS or server groups to use.
4.
Apply the method names to port or line interfaces.
Note:
This guide assumes that RADIUS and servers have already been
configured to support AAA. The configuration of RADIUS and server
software is beyond the scope of this guide, refer to the documentation provided
with the RADIUS or server software.
Configuring Local/
Remote Logon
Authentication
Use the Security > AAA > System Authentication page to specify local or remote
authentication. Local authentication restricts management access based on user
names and passwords manually configured on the switch. Remote authentication
uses a remote access authentication server based on RADIUS or protocols
to verify management access.
Command Usage
◆
By default, management access is always checked against the authentication
database stored on the local switch. If a remote authentication server is used,
you must specify the authentication sequence. Then specify the corresponding
parameters for the remote authentication protocol using the Security > AAA >
Server page. Local and remote logon authentication control management
access via the console port, web browser, or Telnet.
◆
You can specify up to three authentication methods for any user to indicate the
authentication sequence. For example, if you select (1) RADIUS, (2) TACACS and
(3)
Local, the user name and password on the RADIUS server is verified first. If
the RADIUS server is not available, then authentication is attempted using the
server, and finally the local user name and password is checked.
Parameters
These parameters are displayed:
◆
Authentication Sequence
–
Select the authentication, or authentication
sequence required:
■
Local
–
User authentication is performed only locally by the switch.
■
RADIUS
–
User authentication is performed using a RADIUS server only.
■
TACACS
–
User authentication is performed using a server only.
■
[authentication sequence]
–
User authentication is performed by up to
three authentication methods in the indicated sequence.
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...