ii
Local Authentication of FTP/Telnet Users·····················································································2-28
HWTACACS Authentication and Authorization of Telnet Users ···················································2-30
Troubleshooting AAA ····························································································································2-31
Troubleshooting RADIUS Configuration························································································2-31
Troubleshooting HWTACACS Configuration ················································································2-31
3 EAD Configuration·····································································································································3-1
Introduction to EAD·································································································································3-1
Typical Network Application of EAD ·······································································································3-1
EAD Configuration ··································································································································3-1
EAD Configuration Example ···················································································································3-2