Contents
OmniSwitch AOS Release 6 Network Configuration Guide September 2009 xxvii
Verifying Access Guardian Users ...............................................................................34-42
Logging Users out of the Network .......................................................................34-44
Verifying the Access Guardian Configuration ............................................................34-45
Chapter 35 Managing Authentication Servers ......................................................................35-1
In This Chapter ..............................................................................................................35-1
Authentication Server Specifications ............................................................................35-2
Server Defaults ..............................................................................................................35-3
RADIUS Authentication Servers ...........................................................................35-3
TACACS+ Authentication Servers ........................................................................35-3
LDAP Authentication Servers ................................................................................35-3
Quick Steps For Configuring Authentication Servers ..................................................35-4
Server Overview ............................................................................................................35-5
Backup Authentication Servers ..............................................................................35-5
Authenticated Switch Access .................................................................................35-5
Authenticated VLANs ............................................................................................35-6
Port-Based Network Access Control (802.1X) ......................................................35-7
ACE/Server ...................................................................................................................35-8
Clearing an ACE/Server Secret ..............................................................................35-8
RADIUS Servers ...........................................................................................................35-9
RADIUS Server Attributes .....................................................................................35-9
Standard Attributes ..........................................................................................35-9
Vendor-Specific Attributes for RADIUS ......................................................35-11
Configuring Functional Privileges on the Server ..........................................35-12
RADIUS Accounting Server Attributes ........................................................35-13
Configuring the RADIUS Client ..........................................................................35-14
TACACS+ Server .......................................................................................................35-15
TACACS+ Client Limitations ..............................................................................35-15
Configuring the TACACS+ Client .......................................................................35-16
LDAP Servers .............................................................................................................35-17
Setting Up the LDAP Authentication Server .......................................................35-17
LDAP Server Details ............................................................................................35-18
LDIF File Structure .......................................................................................35-18
Common Entries ............................................................................................35-18
Directory Entries ...........................................................................................35-19
Directory Searches .........................................................................................35-20
Retrieving Directory Search Results .............................................................35-20
Directory Modifications ................................................................................35-20
Directory Compare and Sort ..........................................................................35-21
The LDAP URL ............................................................................................35-21
Password Policies and Directory Servers ......................................................35-22
Directory Server Schema for LDAP Authentication ............................................35-23
Vendor-Specific Attributes for LDAP Servers ..............................................35-23
LDAP Accounting Attributes ........................................................................35-24
Dynamic Logging ..........................................................................................35-26
Configuring the LDAP Authentication Client .....................................................35-27
Creating an LDAP Authentication Server .....................................................35-28