RADIUS Authentication and Accounting
Configuring the Switch for RADIUS Authentication
•
Timeout Period:
The timeout period the switch waits for a RADIUS
server to reply. (Default: 5 seconds; range: 1 to 15 seconds.)
•
Retransmit Attempts:
The number of retries when there is no server
response to a RADIUS authentication request. (Default: 3; range of 1
to 5.)
•
Server Dead-Time:
The period during which the switch will not send
new authentication requests to a RADIUS server that has failed to
respond to a previous request. This avoids a wait for a request to time
out on a server that is unavailable. If you want to use this feature,
select a dead-time period of 1 to 1440 minutes. (Default: 0—disabled;
range: 1 - 1440 minutes.) If your first-choice server was initially
unavailable, but then becomes available before the dead-time expires,
you can nullify the dead-time by resetting it to zero and then trying to
log on again. As an alternative, you can reboot the switch, (thus
resetting the dead-time counter to assume the server is available) and
then try to log on again.
•
Number of Login Attempts:
This is actually an
aaa authentication
command. It controls how many times per session a RADIUS client
(and clients using other forms of access) can try to log in with the
correct username and password. (Default: Three times per session.)
(For RADIUS accounting features, refer to “Configuring RADIUS Accounting”
on page 5-35.)
1. Configure Authentication for the Access Methods
You Want RADIUS To Protect
This section describes how to configure the switch for RADIUS authentication
through the following access methods:
■
Console:
Either direct serial-port connection or modem connection.
■
Telnet:
Inbound Telnet must be enabled (the default).
■
SSH:
To use RADIUS for SSH access, first configure the switch for
SSH operation. Refer to chapter 7, “Configuring Secure Shell (SSH)” .
■
Web:
You can enable RADIUS authentication for web browser inter
face access to the switch.
You can configure RADIUS as the primary password authentication method
for the above access methods. You also need to select either
local
,
none,
or
authorized
as a secondary, or backup, method. Note that for console access, if
you configure
radius
(or
tacacs
) for primary authentication, you must config
5-10
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...