5-24
Authentication
How Authentication Operates
How Authentication Operates
General Authentication Process Using a
Server
Authentication through a server operates generally as described
below. For specific operating details, refer to the documentation you received
with your server application.
Figure 5-10. Using a Server for Authentication
Using figure 5-10, above, after either switch detects an operator’s logon
request from a remote or directly connected terminal, the following events
occur:
1.
The switch queries the first-choice server for authentication
of the request.
•
If the switch does not receive a response from the first-choice
server, it attempts to query a secondary server. If the
switch does not receive a response from any server,
then it uses its own local username/password pairs to authenti-
cate the logon request. (See “Local Authentication Process” on
page 5-25.)
•
If a server recognizes the switch, it forwards a user-
name prompt to the requesting terminal via the switch.
2.
When the requesting terminal responds to the prompt with a username,
the switch forwards it to the server.
HP Switch
Configured
for Operation
First-Choice
Server
B
HP Switch
Configured for
Operation
Terminal “
A
” Directly Accessing This
Switch Via Switch’s Console Port
Terminal “
B
” Remotely
Accessing This Switch Via Telnet
A
Second-Choice
Server
(Optional)
Third-Choice
Server
(Optional)
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......