SSH authentication timeout: 100
SSH authentication retries: 5
Console#show ssh
Information of secure shell
Session Username Version Encrypt method Negotiation state
------- -------- ------- -------------- -----------------
0 admin 1.5 cipher-3des session-started
Console#
Authentication Settings
Remote Authentication Dial-in User Service (RADIUS) and Terminal Access Controller Access Control System Plus () are systems that use a central
server to control access to switches on a network. A server running RADIUS or software can be used to create a database of multiple user
name/password pairs with associated privilege levels for each user or group that require management access to a switch using the console port, Telnet, or
Internet.
The RADIUS system uses UDP while uses TCP. UDP only offers best effort delivery, while TCP offers a connection-oriented transport. Also, note that
RADIUS encrypts only the password in the access-request packet from the client to the server, while encrypts the entire body of the packet.
Both RADIUS and authentication control management access via the console port, Web browser, or Telnet. These access options must be configured
on the authentication server together with user names, passwords, and specific privilege levels for each user name/password pair.
The Switch/Security/Authentication Settings page contains the following editable fields:
l
Authentication Sequence
—
Select the authentication, or authentication sequence, required: (Default: local)
¡
Local
—
The switch authenticates the user.
¡
RADIUS
—
A RADIUS server authenticates the user.
¡
TACACS
—
A server authenticates the user.
¡
Local, RADIUS
—
The switch attempts to authenticate the user first, and then a RADIUS server attempts to authenticate the user.
¡
Local, TACACS
—
The switch attempts to authenticate the user first, and then a server attempts to authenticate the user.
¡
RADIUS, Local
—
A RADIUS server attempts to authenticate the user first, and then the switch attempts to authenticate the user.
¡
RADIUS, TACACS
—
A RADIUS server attempts to authenticate the user first, and then a server attempts to authenticate the user.
¡
Local, RADIUS, TACACS
—
The switch attempts to authenticate the user first, then a RADIUS server, and then a server.
¡
Local, TACACS, RADIUS
—
The switch attempts to authenticate the user first, then a server, and then a RADIUS server.
¡
RADIUS, Local, TACACS
—
A RADIUS server attempts to authenticate the user first, then the switch, and then a server.
¡
RADIUS, TACACS, Local
—
A RADIUS server attempts to authenticate the user first, then a server, and then the switch.
¡
TACACS, Local, RADIUS
—
A server attempts to authenticate the user first, then the switch, and then a RADIUS server.
¡
TACACS, RADIUS, Local
—
A server attempts to authenticate the user first, then a RADIUS server, and then the switch.
l
RADIUS Server Settings
—
If using a RADIUS server, specify the following details:
¡
Server IP Address
—
Identifies the IP address of the RADIUS server.
¡
Server Port Number
—
Identifies the User Datagram Protocol (UDP) port number used by the RADIUS server.
¡
Secret Text String
—
Specifies the text string that is shared between the switch and the RADIUS server. Do not use blank spaces in the string.
¡
Number of Server Transmits
—
Specifies the number of request transmits to the RADIUS server before failure.
¡
Timeout for a Reply
—
Specifies the number of seconds the switch waits for a reply from the RADIUS server before it resends the request.
NOTE:
When you are setting up privilege levels on a RADIUS or server, level 0 allows Normal Exec access to the switch, and level 15 allows
Privileged Exec access.
Содержание PowerConnect 5212
Страница 5: ......
Страница 83: ...Console config clear counters ethernet 1 17 Back to Contents Page ...
Страница 90: ...Back to Contents Page ...