1-15
z
The authentication method specified with the
authentication default
command is for all types of
users and has a priority lower than that for a specific access mode.
z
With an authentication method that references a RADIUS scheme, AAA accepts only the
authentication result from the RADIUS server. The Access-Accept message from the RADIUS
server does include the authorization information, but the authentication process ignores the
information.
z
With the
radius-scheme
radius-scheme-name
local
,
hwtacacs-scheme
hwtacacs-scheme-name local
, local authentication is the backup method and is used only when
the remote server is not available.
z
If the primary authentication method is
local
or
none
, the system performs local authentication or
does not perform any authentication, and will not use any RADIUS, HWTACACS authentication
scheme.
Configuring AAA Authorization Methods for an ISP Domain
In AAA, authorization is a separate process at the same level as authentication and accounting. Its
responsibility is to send authorization requests to the specified authorization server and to send
authorization information to users. Authorization method configuration is optional in AAA configuration.
AAA supports the following authorization methods:
z
No authorization: No authorization exchange is performed. Every user is trusted and has the
corresponding default rights of the system.
z
Local authorization: Users are authorized by the access device according to the attributes
configured for them.
z
Remote authorization: The access device cooperates with a RADIUS or HWTACACS server to
authorize users. RADIUS authorization is bound with RADIUS authentication. RADIUS
authorization can work only after RADIUS authentication is successful, and the authorization
information is carried in the Access-Accept message. HWTACACS authorization is separate from
HWTACACS authentication, and the authorization information is carried in the authorization
response after successful authentication. You can configure local authorization or no authorization
as the backup method to be used when the remote server is not available.
By default, an ISP domain uses the local authorization method. If the no authorization method (
none
) is
configured, the users are not required to be authorized, in which case an authenticated user has the
default right. The default right is visiting (the lowest one) for EXEC users (that is, console users who use
the console, AUX, asynchronous serial port, or Telnet to connect to the device, such as Telnet or SSH
users. Each connection of these types is called an EXEC user). The default right for FTP users is to use
the root directory of the device.
Before configuring authorization methods, complete these three tasks:
1) For HWTACACS authorization, configure the HWTACACS scheme to be referenced first. For
RADIUS authorization, the RADIUS authorization scheme must be the same as the RADIUS
authentication scheme; otherwise, it does not take effect.
Содержание S5810 Series
Страница 307: ...ii Configured Multicast Group Policy Fails to Take Effect 1 32...
Страница 648: ...1 8 Return to the upper directory Sysname cd Display the current working directory Sysname pwd flash...
Страница 812: ...1 7 Role Slave Sysname stack_3 DeviceD Device type S5810 50S MAC address 000f e200 1003...