
3
Configure the 802.1X
globally.
Required. By default, the global 802.1X function is
disabled. On the
Network Security→802.1X→Global
Config
page, configure the 802.1X function globally.
4
Configure the 802.1X for
the port.
Required. On the
Network Security→802.1X→Port
Config
page, configure the 802.1X feature for the port of
the switch basing on the actual network.
5
Configure the parameters
of the authentication server
Required. On the
Network Security→AAA→Radius
Config
page, configure the parameters of the server.
14.7
AAA
Overview
AAA stands for authentication, authorization and accounting. This feature is used to
authenticate users trying to log in to the switch or trying to access the administrative level
privilege.
Username and password pairs are used for login and privilege authentication. The
authentication can be processed locally in the switch or centrally in the RADIUS/
server(s). The local authentication username and password pairs can be configured in
Applicable Access Application
The authentication can be applied on the following access applications: Console, Telnet, SSH
and HTTP.
Authentication Method List
A method list describes the authentication methods and their sequence to authenticate a user.
The switch supports Login List for users to gain access to the switch, and Enable List for
normal users to gain administrative privileges.
The administrator can set the authentication methods in a preferable order in the list. The
switch uses the first method listed to authenticate users, if that method fails to respond, the
switch selects the next authentication method in the method list. This process continues until
there is a successful communication with a listed authentication method or until all defined
methods are exhausted. If authentication fails at any point in this circle, which means the
secure server or the local switch denies the user’s access, the authentication process stops
and no other authentication methods are attempted.
802.1X Authentication
802.1X protocol uses the RADIUS to provide detailed accounting information and flexible
administrative control over authentication process. The Dot1x List feature defines the RADIUS
server groups in the 802.1X authentication.
RADIUS/ Server
User can configure the RADIUS/ servers for the connection between the switch and
the server.
358