EasyManua.ls Logo

Alcatel-Lucent AOS-W 6.5.3.x - Configuring Server Groups

Alcatel-Lucent AOS-W 6.5.3.x
1160 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
199| Authentication Servers AOS-W 6.5.3.x| User Guide
Configuring Server Groups
You can create groups of servers for specific types of authentication for example, you can specify one or
more RADIUS servers to be used for 802.1X authentication. You can configure servers of different types in one
group. For example, you can include the internal database as a backup to a RADIUS server.
Configuring Server Groups
Server names are unique. You can configure the same server in more than one server group. You must
configure the server before you can include it in a server group.
Using the WebUI
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Server Group to display the Server Group list.
3. Enter the name of the new server group and click Add.
4. Select the name to configure the server group.
5. Under Servers, click New to add a server to the group.
a. Select a server from the drop-down list and click Add Server.
b. Repeat the above step to add other servers to the group.
6. Click Apply.
Using the CLI
(host)(config) #aaa server-group <name>
auth-server <name>
Configuring Server List Order and Fail-Through
The servers in a server group are part of an ordered list. The first server in the list is always used by default,
unless it is unavailable, in which case the next server in the list is used. You can configure the order of servers in
the server group through the WebUI using the up or down arrows (the top server is the first server in the list).
In the CLI, the position parameter specifies the relative order of servers in the list (the lowest value denotes
the first server in the list).
As mentioned previously, the first available server in the list is used for authentication. If the server responds
with an authentication failure, there is no further processing for the user or client for which the authentication
request failed. You can also enable fail-through authentication for the server group so that if the first server in
the list returns an authentication deny, the switch attempts authentication with the next server in the ordered
list. The switch attempts to authenticate with each server in the list until there is a successful authentication or
the list of servers in the group is exhausted. This feature is useful in environments where there are multiple,
independent authentication servers; users may fail authentication on one server but can be authenticated on
another server.
Before enabling fail-through authentication, note the following:
n This feature is not supported for 802.1X authentication with a server group that consists of external EAP-
compliant RADIUS servers. You can, however, use fail-through authentication when the 802.1X
authentication is terminated on the switch (AAA FastConnect).
n Enabling this feature for a large server group list may cause excess processing load on the switch. It is
recommended that you use server selection based on domain matching whenever possible (see Configuring
Dynamic Server Selection on page 200).
n Certain servers, such as the RSA RADIUS server, lock out the switch if there are multiple authentication
failures. Therefore, you should not enable fail-through authentication with these servers.

Table of Contents