
123
4.
Configuring Security Features
4.1.
Controlling Management Access
A user can access the switch management interface only after providing a valid user name and password
combination that matches the user account information stored in the user database configured on the
switch.
QNOS software includes several additional features to increase management security and help prevent
unauthorized access to the switch configuration interfaces.
4.1.1.
Using RADIUS Servers for Management Security
Many networks use a RADIUS server to maintain a centralized user database that contains per-user
authentication information. RADIUS servers provide a centralized authentication method for:
Telnet Access
Console to Switch Access
Access Control Port (802.1X)
RADIUS access control utilizes a database of user information on a remote server. Making use of a single
database of accessible information—as in an Authentication Server—can greatly simplify the authentication
and management of users in a large network. One such type of Authentication Server supports the Remote
Authentication Dial In User Service (RADIUS) protocol as defined by RFC 2865.
For authenticating users prior to access, the RADIUS standard has become the protocol of choice by
administrators of large accessible networks. To accomplish the authentication in a secure manner, the
RADIUS client and RADIUS server must both be configured with the same shared password or secret. This
secret is used to generate one-way encrypted authenticators that are present in all RADIUS packets. The
secret is never transmitted over the network.
RADIUS conforms to a secure communications client/server model using UDP as a transport protocol. It is
extremely flexible, supporting a variety of methods to authenticate and statistically track users. RADIUS is
also extensible, allowing for new methods of authentication to be added without disrupting existing
functionality.
As a user attempts to connect to the switch management interface, the switch first detects the contact and
prompts the user for a name and password. The switch encrypts the supplied information, and a RADIUS
client transports the request to a pre-configured RADIUS server.
Summary of Contents for QuantaMesh QNOS5
Page 1: ...QuantaMesh Ethernet Switch Configuration Guide QNOS5 NOS Platform ...
Page 209: ...209 Table 7 8 IPv6 Neighbor Discovery Settings ...
Page 226: ...226 Table 8 2 L3 Multicast Defaults ...
Page 254: ...254 Appendix A Term and Acronyms Table 9 5 Terms and Acronyms ...