RADIUS Authentication and Accounting
Configuring the Switch for RADIUS Authentication
ure
local
for the secondary method. This prevents the possibility of being
completely locked out of the switch in the event that all primary access
methods fail.
Syntax:
aaa authentication < console | telnet | ssh | web | < enable | login <local
| radius>> web-based | mac-based <chap-radius | peap-radius>>
Configures RADIUS as the primary password authentication
method for console, Telnet, SSH, and/or the web browser interface.
(The default primary
< enable | login >
authentication is
local
.)
<console | telnet | ssh | web>
[< local | none | authorized >]
Provides options for secondary authentication
(default:
none
). Note that for console access, secondary
authentication must be
local
if primary access is not
local
. This prevents you from being locked out of the
switch in the event of a failure in other access methods.
<<web-based | mac-based > login> <chap-radius | peap-mschap v2>:
Password authentication for web-based or mac-based port
access to the switch. Use
peap-mschapv2
when you want pass
word verification without requiring access to a plain text
password; it is more secure.
Default:
chap-radius
[none | authorized]
:
Provides options for secondary
authentication. The
none
option specifies that a backup
authentication method is not used. The
authorized
option allows access without authentication. (default:
none
).
In certain situations, RADIUS servers can become isolated from the network.
Users are not able to access the network resources configured with RADIUS
access protection and are rejected. To address this situation, configuring the
authorized
secondary authentication method allows users unconditional
access to the network when the primary authentication method fails because
the RADIUS servers are unreachable.
C a u t i o n
Configuring
authorized
as the secondary authentication method used when
there is a failure accessing the RADIUS servers allows clients to access the
network unconditionally. Use this method with care.
5-11
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...