
Security Measures
135
Instruction Manual - NXA-ENET8-POE+
Configuring Local/ Remote Logon Authentication
Use the Security > AAA > System Authentication page to specify local or remote authentication. Local authentication restricts
management access based on user names and passwords manually configured on the switch. Remote authentication uses a
remote access authentication server based on RADIUS or protocols to verify management access.
Command Usage
By default, management access is always checked against the authentication database stored on the local switch. If a
remote authentication server is used, you must specify the authentication sequence. Then specify the corresponding
parameters for the remote authentication protocol using the Security > AAA > Server page. Local and remote logon
authentication control management access via the console port, web browser, or Telnet.
You can specify up to three authentication methods for any user to indicate the authentication sequence. For example, if
you select (1) RADIUS, (2) TACACS and (3)Local, the user name and password on the RADIUS server is verified first. If the
RADIUS server is not available, then authentication is attempted using the server, and finally the local user name
and password is checked.
The following table lists the options on this page:
Perform these steps to configure the method(s) of controlling management access:
1.
Click
Security
>
AAA
>
System Authentication
.
2.
Specify the authentication sequence (i.e., one to three methods).
3.
Click
Apply
.
Configuring Remote Login Authentication Servers
Use the Security > AAA > Server page to configure the message exchange parameters for RADIUS or remote access
authentication servers.
Remote Authentication Dial-in User Service (RADIUS) and Terminal Access Controller Access Control System Plus () are
login authentication protocols that use software running on a central server to control access to RADIUS- aware or TACACS-aware
devices on the network. An authentication server contains a database of multiple user name/password pairs with associated
privilege levels for each user that requires management access to the switch.
RADIUS uses UDP while uses TCP. UDP only offers best effort delivery, while TCP offers a more reliable
connection-oriented transport. Also, note that RADIUS encrypts only the password in the access-request packet from the client to
the server, while encrypts the entire body of the packet.
Security - AAA (System Authentication) Options
Authentication Sequence
Select the authentication, or authentication sequence required:
• Local - User authentication is performed only locally by the switch.
• RADIUS - User authentication is performed using a RADIUS server only.
• TACACS - User authentication is performed using a server only.
• [authentication sequence] - User authentication is performed by up to three authentication
methods in the indicated sequence.
FIG. 153
Configuring the Authentication Sequence
FIG. 154
Authentication Server Operation
Web
Telnet
Console
RADIUS/
server
1. Client attempts management access.
2. Switch contacts authentication server.
3. Authentication server challenges event.
4. Client responds with proper password or key.
5. Authentication server approves access.
6. Switch grants management access.