General Setup Procedure for Web/MAC Authentication
. . . . . . . . 4-12
Do These Steps Before You Configure Web/MAC Authentication . . 4-12
Additional Information for Configuring the RADIUS
Server To Support MAC Authentication . . . . . . . . . . . . . . . . . . . . . 4-13
Configuring the Switch To Access a RADIUS Server
. . . . . . . . . . . . 4-14
Configuring Web Authentication on the Switch
. . . . . . . . . . . . . . . . 4-17
Configure the Switch for Web-Based Authentication . . . . . . . . . . . . . 4-18
Configuring MAC Authentication on the Switch
. . . . . . . . . . . . . . . . 4-22
Configure the Switch for MAC-Based Authentication . . . . . . . . . . . . 4-23
Show Status and Configuration of Web-Based Authentication
. . 4-26
Show Status and Configuration of MAC-Based Authentication
. . 4-27
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Terminology Used in TACACS Applications:
. . . . . . . . . . . . . . . . . . . . 5-3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
General Authentication Setup Procedure
. . . . . . . . . . . . . . . . . . . . . . . 5-5
. . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8
CLI Commands Described in this Section . . . . . . . . . . . . . . . . . . . . . . . 5-9
Viewing the Switch’s Current Authentication Configuration . . . . . . . 5-9
Server Contact Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10
Configuring the Switch’s Authentication Methods . . . . . . . . . . . . . . . 5-11
Configuring the Switch’s Server Access . . . . . . . . . . . . . . 5-15
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
General Authentication Process Using a Server . . . . . . . . 5-20
Local Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22
Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23
vi
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......