156
Configuring Switch-Based Authentication
Information About Configuring Switch-Based Authentication
You can configure the switch to use AAA server groups to group existing server hosts for authentication. For more
information, see
Defining AAA Server Groups, page 174
.
RADIUS Login Authentication
To configure AAA authentication, you define a named list of authentication methods and then apply that list to various
ports. The method list defines the types of authentication to be performed and the sequence in which they are performed;
it must be applied to a specific port before any of the defined authentication methods are performed. The only exception
is the default method list (which, by coincidence, is named
default
). The default method list is automatically applied to
all ports except those that have a named method list explicitly defined.
Radius Method List
A method list defines the sequence and methods to be used to authenticate, to authorize, or to keep accounts on a user.
You can use method lists to designate one or more security protocols to be used (such as or local username
lookup), which ensures a backup system if the initial method fails. The software uses the first method listed to
authenticate, to authorize, or to keep accounts on users. If that method does not respond, the software selects the next
method in the list. This process continues until there is successful communication with a listed method or the method list
is exhausted.
AAA Server Groups
You can configure the switch to use AAA server groups to group existing server hosts for authentication. You select a
subset of the configured server hosts and use them for a particular service. The server group is used with a global
server-host list, which lists the IP addresses of the selected server hosts.
Server groups also can include multiple host entries for the same server if each entry has a unique identifier (the
combination of the IP address and UDP port number), allowing different ports to be individually defined as RADIUS hosts
providing a specific AAA service. If you configure two different host entries on the same RADIUS server for the same
service, (for example, accounting), the second configured host entry acts as a failover backup to the first one.
You use the
server
group server configuration command to associate a particular server with a defined group server. You
can either identify the server by its IP address or identify multiple host instances or entries by using the optional
auth-port
and
acct-port
keywords.
RADIUS Authorization for User Privileged Access and Network Services
AAA authorization limits the services available to a user. When AAA authorization is enabled, the switch uses information
retrieved from the user’s profile, which is in the local user database or on the security server, to configure the user’s
session. The user is granted access to a requested service only if the information in the user profile allows it.
You can use the
aaa authorization
global configuration command with the
radius
keyword to set parameters that restrict
a user’s network access to privileged EXEC mode.
The
aaa authorization exec radius local
command sets these authorization parameters:
Use RADIUS for privileged EXEC access authorization if authentication was performed by using RADIUS.
Use the local database if authentication was not performed by using RADIUS.
Note:
Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been
configured.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...