Configuration Guide
AAA Configuration
Configuring Authentication
The authentication allows
the user’s identity verification before the user of network resources.
In most cases, the authentication is implemented with the AAA security features. We
recommend the use of AAA as much as possible.
Defining AAA Authentication Method List
To configure the AAA authentication, the first step is to define a named list of the authentication
method, and then the applications use the defined list for authentication. The method list
defines the authentication type and execution order. The defined authentication methods must
be applied on specific interfaces before they can be executed. The default method list is
exceptional.When not configured, all applications will use the default method list.
The method list is just a list to define the authentication method to be queried in turn to verify
the user identity. The method list can define one or more security protocols for authentication,
so that there are backup systems available for the authentication in case of the failure of the
first method. Our product works with the first method in the method list for user authentication,
and then selects the next method in the method list in case of no reply from that method. This
process goes on till an authentication method listed successfully allows communication or all
methods listed are used up. If all methods listed are used up but the communication is not
allowed, it declares failure of authentication.
Caution
Only when there is no reply from a method, our product will attempt the next
method. During the authentication, if the user access is refused by a method,
the authentication process ends and no other methods will be attempted.
Example of Method List
In a typical AAA network configuration, there are two servers: R1 and R2 are both RADIUS
servers. Suppose the network administrator has chosen a security solution, and the NAS
authentication uses an authentication method to authenticate the Telnet connection: First, R1
is used for the user authentication. In case of no reply, R2 will be used. In case there is no
reply from both R1 and R2, the local database of the access server will perform the
authentication. To configure the above authentication list, run the following commands:
Command
Function
configure terminal
Enter the global configuration mode.
aaa authentication login default
group radius local
Configure a default authentication method list,
where "default" is the name of the method list.
The protocols included in this method list are
listed behind the name in the order by which
they will be queried. The default method list is
applied on all applications.
Содержание RG-S2900G-E Series
Страница 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Страница 91: ...Configuration Guide Configuring PoE Configuration ...
Страница 133: ...Configuration Guide EEE Configuration ...
Страница 319: ...Configuration Guide QinQ Configuration ...
Страница 408: ......
Страница 409: ...IP Routing Configuration 1 Static Route Configuration ...
Страница 412: ......
Страница 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Страница 621: ...Configuration Guide CPU Protection Configuration udp helper 180 4 dhcp client 180 4 lacp 180 4 ...
Страница 757: ......
Страница 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Страница 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Страница 901: ...Configuration Guide ERSPAN Configuration ...
Страница 902: ...Web based Configuration 1 Web based Configuration ...