C
ONFIGURING
THE
S
WITCH
2-16
•
RADIUS uses UDP while uses TCP. UDP only offers best
effort delivery, while TCP offers a connection-oriented transport.
Also, note that RADIUS encrypts only the password in the
access-request packet from the client to the server, while
encrypts the entire body of the packet.
•
RADIUS and logon authentication control management
access via the console port, Web browser, or Telnet. These access
options must be configured on the authentication server.
•
RADIUS and logon authentication assign a specific
privilege level for each user name/password pair. The user name,
password, and privilege level must be configured on the authentication
server.
•
You can specify up to three authentication methods for any user to
indicate the authentication sequence. For example, if you select (1)
RADIUS, (2) TACACS and (3) Local, the user name and password on
the RADIUS server is verified first. If the RADIUS server is not
available, then authentication is attempted using the server,
and finally the local user name and password is checked.
Command Attributes
•
Authentication
– Select the authentication, or authentication
sequence required:
-
RADIUS
– User authentication is performed using a RADIUS
server only.
-
TACACS
– User authentication is performed using a
server only.
-
Local
– User authentication is performed only locally by the switch.
-
[authentication sequence]
– User authentication is performed by
up to three authentication methods in the indicated sequence.
Summary of Contents for TigerSwitch 100
Page 2: ......
Page 30: ...SWITCH MANAGEMENT 1 16...
Page 314: ...COMMAND LINE INTERFACE 3 170...
Page 316: ...TROUBLESHOOTING A 2...
Page 330: ...GLOSSARY Glossary 8...
Page 333: ......