78
C
HAPTER
10: M
AKING
Y
OUR
N
ETWORK
S
ECURE
manageable network device is a commonplace security measure. If the
local Switch database is enabled, the network administrator must have
local access to each Switch to securely change user name and password
information. This can be time consuming, tedious and often results in bad
configurations and lapses in security.
RADIUS authentication provides centralized, secure access and removes
the need to physically visit each network device. Changes to user names
and passwords require only a single action on the RADIUS database and
are reflected immediately.
The Switch 3226 and Switch 3250 are fully compliant with the industry
standard RADIUS protocol. For further information about RADIUS, see
“What is RADIUS?”
on
page 80
.
How
RADIUS
Authentication
Works
When RADIUS authentication of Switch Management Login is enabled,
the Switch obtains the user’s name and password and securely sends the
information to the RADIUS server. The information is authenticated by the
server and a valid user is allowed to login to the Switch. An invalid user
will receive a reject response and is not allowed to login to the Switch.
This process is shown in
Figure 20
.
Содержание 3CR17501-91 - SuperStack 3 Switch 3250
Страница 8: ......
Страница 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW ...
Страница 43: ...How STP Works 43 Figure 9 STP configurations ...
Страница 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT ...
Страница 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS ...
Страница 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION ...
Страница 98: ...98 CHAPTER 11 IP ROUTING ...
Страница 102: ...102 APPENDIX A CONFIGURATION RULES ...
Страница 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES ...
Страница 132: ...132 INDEX ...