4-24
Authentication
Configuring on the Switch
Figure 4-8. Using a Server for Authentication
Using figure 4-8, above, after either switch detects an operator’s logon request
from a remote or directly connected terminal, the following events occur:
1.
The switch queries the first-choice server for authentication
of the request.
•
If the switch does not receive a response from the first-choice
server, it attempts to query a secondary server. If the
switch does not receive a response from any server,
then it uses its own local username/password pairs to authenti-
cate the logon request. (See “Local Authentication Process” on
page 4-25.)
•
If a server recognizes the switch, it forwards a user-
name prompt to the requesting terminal via the switch.
2.
When the requesting terminal responds to the prompt with a username,
the switch forwards it to the server.
3.
After the server receives the username input, the requesting terminal
receives a password prompt from the server via the switch.
4.
When the requesting terminal responds to the prompt with a password,
the switch forwards it to the server and one of the following
actions occurs:
•
If the username/password pair received from the requesting
terminal matches a username/password pair previously stored in
the server, then the server passes access permission through the
switch to the terminal.
ProCurve Switch
Configured for
Operation
First-Choice
Server
B
ProCurve Switch
Configured for
Operation
Terminal “
A
” Directly Accessing This
Switch Via Switch’s Console Port
Terminal “
B
” Remotely
Accessing This Switch Via Telnet
A
Second-Choice
Server
(Optional)
Third-Choice
Server
(Optional)
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......