1-11
For a user who has logged in to the device, AAA provides the following services to enhance device
security:
z
Command authorization: Allows the authorization server to check each command executed by the
login user and only authorized commands can be successfully executed.
z
Command accounting: Allows the accounting server to record all commands executed on the
device or all authorized commands successfully executed.
z
Level switching authentication: Allows the authentication server to authenticate users performing
privilege level switching. As long as passing level switching authentication, users can switch their
user privilege levels, without logging out and disconnecting the current connections.
You can configure different authentication, authorization, and accounting methods for different users in
a domain. For configuration details, refer to
Configuring AAA
.
Table 1-4
Configuration references for the related parameters
Access type/service type
Refer to…
LAN (such as 802.!X and MAC address
authentication)
802.1X Configuration
and
MAC Authentication
Configuration
in the
Security Volume
Login (such as SSH, Telnet, FTP, and terminal)
SSH2.0 Configuration
in the
Security Volume
.
FTP and TFTP Configuration
in the
IP Services
Volume
Portal
Portal Configuration
in the
Security Volume
Command authorization and accounting
Login Configuration
in the
System Volume
.
Level switching authentication
Basic System Configuration
in the
System
Volume
.
Protocols and Standards
The protocols and standards related to AAA, RADIUS, and HWTACACS include:
z
RFC 2865: Remote Authentication Dial In User Service (RADIUS)
z
RFC 2866: RADIUS Accounting
z
RFC 2867: RADIUS Accounting Modifications for Tunnel Protocol Support
z
RFC 2868: RADIUS Attributes for Tunnel Protocol Support
z
RFC 2869: RADIUS Extensions
z
RFC 1492: An Access Control Protocol, Sometimes Called TACACS
AAA Configuration Task List
The basic procedure to configure AAA is as follows:
1) Configure the required AAA schemes.
z
Local authentication: Configure local users and related attributes, including usernames and
passwords of the users to be authenticated.
z
Remote authentication: Configure the required RADIUS, and/or HWTACACS schemes, and
configure user attributes on the servers accordingly.
2) Configure the AAA methods: Reference the configured AAA schemes in the users’ ISP domains.
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...