![EtherWAN EX26262 Скачать руководство пользователя страница 65](http://html1.mh-extra.com/html/etherwan/ex26262/ex26262_management-manual_2432724065.webp)
– 65 –
C
HAPTER
4
| Configuring the Switch
Configuring Security
pairs with associated privilege levels for each user that requires
management access to the switch.
Figure 14: Authentication Server Operation
Web
RADIUS/
server
1. Client attempts management access.
2. Switch contacts authentication ser.ver
3. Authentication server challenges client.
4. Client responds with proper password or .key
5. Authentication server approves access.
6. Switch grants management access.
P
ATH
Advanced Configuration, Security, Switch, Auth Method
U
SAGE
G
UIDELINES
◆
The switch supports the following authentication services:
■
Authorization of users that access the Telnet, SSH, the web, or
console management interfaces on the switch.
■
Accounting for users that access the Telnet, SSH, the web, or
console management interfaces on the switch.
■
Accounting for IEEE 802.1X authenticated users that access the
network through the switch. This accounting can be used to provide
reports, auditing, and billing for services that users have accessed.
◆
By default, management access is always checked against the
authentication database stored on the local switch. If a remote
authentication server is used, you must specify the authentication
method and the corresponding parameters for the remote
authentication protocol on the Network Access Server Configuration
page. Local and remote logon authentication can be used to control
management access via Telnet, SSH, a web browser, or the console
interface.
◆
When using RADIUS or logon authentication, the user name
and password must be configured on the authentication server. The
encryption methods used for the authentication process must also be
configured or negotiated between the authentication server and logon
client. This switch can pass authentication messages between the
server and client that have been encrypted using MD5 (Message-Digest
5), TLS (Transport Layer Security), or TTLS (Tunneled Transport Layer
Security).
Содержание EX26262
Страница 1: ...Layer 2 Gigabit PoE Ethernet Switch Management Guide...
Страница 2: ......
Страница 3: ...MANAGEMENT GUIDE...
Страница 4: ......
Страница 6: ...6 ABOUT THIS GUIDE...
Страница 18: ...18 FIGURES...
Страница 20: ...20 TABLES...
Страница 22: ...22 SECTION I Getting Started...
Страница 34: ...34 SECTION II Web Configuration...
Страница 46: ...46 CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface...
Страница 202: ...CHAPTER 4 Configuring the Switch Quality of Service 202 Figure 83 Configuring Port Tag Remarking Mode...
Страница 290: ...290 CHAPTER 5 Monitoring the Switch Displaying Information About Flow Sampling...
Страница 294: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 294...
Страница 300: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 300...
Страница 302: ...302 SECTION III Appendices...
Страница 320: ...GLOSSARY 320...
Страница 325: ......
Страница 326: ......