EasyManuals Logo

3Com SUPERSTACK 3 3250 User Manual

3Com SUPERSTACK 3 3250
132 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #78 background imageLoading...
Page #78 background image
78 CHAPTER 10: MAKING YOUR NETWORK SECURE
manageable network device is a commonplace security measure. If the
local Switch database is enabled, the network administrator must have
local access to each Switch to securely change user name and password
information. This can be time consuming, tedious and often results in bad
configurations and lapses in security.
RADIUS authentication provides centralized, secure access and removes
the need to physically visit each network device. Changes to user names
and passwords require only a single action on the RADIUS database and
are reflected immediately.
The Switch 3226 and Switch 3250 are fully compliant with the industry
standard RADIUS protocol. For further information about RADIUS, see
What is RADIUS? on page 80.
How
RADIUS
Authentication
Works
When RADIUS authentication of Switch Management Login is enabled,
the Switch obtains the users name and password and securely sends the
information to the RADIUS server. The information is authenticated by the
server and a valid user is allowed to login to the Switch. An invalid user
will receive a reject response and is not allowed to login to the Switch.
This process is shown in Figure 20
.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the 3Com SUPERSTACK 3 3250 and is the answer not in the manual?

3Com SUPERSTACK 3 3250 Specifications

General IconGeneral
Brand3Com
ModelSUPERSTACK 3 3250
CategorySwitch
LanguageEnglish

Related product manuals