ii
Local Authentication of FTP/Telnet Users·····················································································2-28
HWTACACS Authentication and Authorization of Telnet Users ···················································2-29
Troubleshooting AAA ····························································································································2-30
Troubleshooting RADIUS Configuration························································································2-30
Troubleshooting HWTACACS Configuration ················································································2-31
3 EAD Configuration·····································································································································3-1
Introduction to EAD·································································································································3-1
Typical Network Application of EAD ·······································································································3-1
EAD Configuration ··································································································································3-1
EAD Configuration Example ···················································································································3-2