– 165 –
7
Authentication Commands
You can configure this switch to authenticate users logging into the system for
management access using local or remote authentication methods. Port-based
authentication using IEEE 802.1X can also be configured to control either
management access to the uplink ports or client access
3
to the data ports.
User Accounts
The basic commands required for management access are listed in this section. This
switch also includes other options for password checking via the console or a
Telnet connection (
page 100
), user authentication via a remote authentication
server (
page 165
), and host access authentication for specific ports (
page 200
).
Table 31: Authentication Commands
Command Group
Function
User Accounts
Configures the basic user names and passwords for management
access
Authentication Sequence
Defines logon authentication method and precedence
RADIUS Client
Configures settings for authentication via a RADIUS server
Client
Configures settings for authentication via a server
AAA
Configures authentication, authorization, and accounting for network
access
Web Server
Enables management access via a web browser
Telnet Server
Enables management access via Telnet
Secure Shell
Provides secure replacement for Telnet
802.1X Port Authentication
Configures host authentication on specific ports using 802.1X
Management IP Filter
Configures IP addresses that are allowed management access
3. For other methods of controlling client access, see
“General Security Measures” on
page 219
.
Table 32: User Access Commands
Command
Function
Mode
enable password
Sets a password to control access to the Privileged Exec
level
GC
username
Establishes a user name-based authentication system at
login
GC
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...