5-8
RADIUS Authentication, Authorization and Accounting
Configuring the Switch for RADIUS Authentication
out on a server that is unavailable. If you want to use this feature,
select a dead-time period of 1 to 1440 minutes. (Default: 0—disabled;
range: 1 - 1440 minutes.) If your first-choice server was initially
unavailable, but then becomes available before the dead-time expires,
you can nullify the dead-time by resetting it to zero and then trying to
log on again. As an alternative, you can reboot the switch, (thus
resetting the dead-time counter to assume the server is available) and
then try to log on again.
•
Number of Login Attempts:
This is an
aaa authentication
command.
It controls how many times in one session a RADIUS client (as well
as clients using other forms of access) can try to log in with the correct
username and password. (Default: Three times per session.)
(For RADIUS accounting features, refer to “Configuring RADIUS Accounting”
on page 5-25.)
1. Configure Authentication for the Access Methods
You Want RADIUS To Protect
This section describes how to configure the switch for RADIUS authentication
through the following access methods:
■
Console:
Either direct serial-port connection or modem connection.
■
Telnet:
Inbound Telnet must be enabled (the default).
■
SSH:
To employ RADIUS for SSH access, you must first configure the
switch for SSH operation. Refer to “Configuring Secure Shell (SSH)”
on page 6-1.
■
Web:
Web browser interface.
You can also use RADIUS for Port-Based Access authentication. Refer to
“Configuring Port-Based and Client-Based Access Control (802.1X)” on page
8-1.
You can configure RADIUS as the primary password authentication method
for the above access methods. You will also need to select either
local
or
none
as a secondary, or backup, method. Note that for console access, if you
configure
radius
(or
tacacs
) for primary authentication, you must configure
local
for the secondary method. This prevents the possibility of being com-
pletely locked out of the switch in the event that all primary access methods
fail.
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......