4-13
Authentication
Configuring on the Switch
Table 4-1.
AAA Authentication Parameters
As shown in the next table, login and enable access is always available locally
through a direct terminal connection to the switch’s console port. However,
for Telnet access, you can configure to deny access if a
server goes down or otherwise becomes unavailable to the switch.
Name
Default
Range
Function
console, Telnet,
SSH, web ,
port-access,
mac-based*,
web-based*
n/a
n/a
Specifies the access method used when authenticating.
authentication only uses the console, Telnet or SSH access methods.
* 2510-48 only
enable
- or
-
login
n/a
n/a
Specifies the privilege level to be configured.
enable:
Specifies the "enable" (Manager/read-write) privilege level for the
access method being configured.
login:
Specifies the "login" (Operator/read-only) privilege level for the
access method being configured.
local
- or -
tacacs
- or -
radius
local
n/a
Specifies the primary method of authentication for the access method being
configured.
local:
Use the username/password pair configured locally in the switch for
the privilege level being configured
tacacs:
Use a server.
radius:
Use a RADIUS server.
local
- or -
none
- or -
authorized
none
n/a
Specifies the secondary (backup) method for the access method being config-
ured.
local:
The username/password pair configured locally in the switch for the
privilege level being configured. Cannot be used if the primary
authentication is
local
.
none:
No secondary type of authentication for the specified
method/privilege path.
(Available only if the primary method of
authentication for the access being configured is local.)
authorized:
Allow access without authentication.
Note:
If you do not specify this parameter in the command line, the switch
automatically assigns the secondary method as follows:
• If the primary method is
tacacs
, the secondary method is
local
.
• If the primary method is
local
, the secondary method is
none
.
login privilege-
mode
privilege-
mode
disabled
n/a
Specifies that the switch will respect the authentication server’s privilege level.
The
login p
rivilege-mode
option enables for a single login. The
authorized privilege level (Operator or Manager) is returned to the switch by
the server.
num-attempts
3
1 - 10
In a given session, specifies how many tries at entering the correct username/
password pair are allowed before access is denied and the session terminated.
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......