2-5
To do…
Use the command…
Remarks
Configure an authentication
scheme for the ISP domain
authentication
{
radius-scheme
radius-scheme-name
[
local
] |
hwtacacs-scheme
hwtacacs-scheme-name
[
local
] |
local
|
none
}
Optional
By default, no separate
authentication scheme is
configured.
Configure a HWTACACS
authentication scheme for user
level switching
authentication super
hwtacacs-scheme
hwtacacs-scheme-name
Optional
By default, no HWTACACS
authentication scheme is
configured.
Configure an authorization
scheme for the ISP domain
authorization
{
none
|
hwtacacs-scheme
hwtacacs-scheme-name
}
Optional
By default, no separate
authorization scheme is
configured.
Configure an accounting
scheme for the ISP domain
accounting
{
none
|
radius-scheme
radius-scheme-name
|
hwtacacs-scheme
hwtacacs-scheme-name
}
Optional
By default, no separate
accounting scheme is
configured.
z
RADIUS scheme and local scheme do not support the separation of authentication and
authorization. Therefore, pay attention when you make authentication and authorization
configuration for a domain: When the
scheme radius-scheme
or
scheme local
command is
executed and the
authentication
command is not executed, the authorization information returned
from the RADIUS or local scheme still takes effect even if the
authorization none
command is
executed.
z
The Switch 4200G adopts hierarchical protection for command lines so as to inhibit users at lower
levels from using higher level commands to configure the switches. For details about configuring a
HWTACACS authentication scheme for low-to-high user level switching, refer to
Switching
User
Level
in the
Command Line Interface Operation
.
Configuration guidelines
Suppose a combined AAA scheme is available. The system selects AAA schemes according to the
following principles:
z
If authentication, authorization, accounting each have a separate scheme, the separate schemes
are used.
z
If you configure only a separate authentication scheme (that is, there are no separate authorization
and accounting schemes configured), the combined scheme is used for authorization and
accounting. In this case, if the combined scheme uses RADIUS or HWTACACS, the system never
uses the secondary scheme for authorization and accounting.
z
If you configure no separate scheme, the combined scheme is used for authentication,
authorization, and accounting. In this case, if the system uses the secondary local scheme for
authentication, it also does so for authorization and accounting; if the system uses the first scheme
Содержание Switch 4800G PWR 24-Port
Страница 165: ...1 8 4 mac address es found on port GigabitEthernet1 0 2 ...
Страница 214: ...ii Displaying and Maintaining System Guard 4 1 ...
Страница 445: ...ii ...
Страница 727: ...i Table of Contents Appendix A Acronyms A 1 ...
Страница 730: ...A 3 VOD Video On Demand W WRR Weighted Round Robin X XID eXchange Identification XRN eXpandable Resilient Networking ...