37.5.3 Disabling AAA ..............................................................................................37-4
37.5.4 Subsequent Configuration Steps .................................................................37-4
37.6 Configuring Authentication .......................................................................................................37-4
37.6.1 Defining AAA Authentication Method List .....................................................37-5
37.6.2 Example of Method List ...............................................................................37-5
37.6.3 General Steps in Configuring AAA Authentication .......................................37-6
37.6.4 Configuring the AAA Line Authentication .....................................................37-6
37.6.5 Example of Authentication Configuration ...................................................37-10
37.7 Configuring Authorization ....................................................................................................... 37-11
37.7.1 Preparations for Authorization .................................................................... 37-11
37.7.2 Configuring Authorization List .................................................................... 37-11
37.7.3 RADIUS Authorization ................................................................................37-12
37.7.4 Local Authorization .....................................................................................37-12
37.7.5 None Authorization .....................................................................................37-13
37.7.6 Example of Configuring Network Authorization .........................................37-13
37.8 Configuring Accounting ..........................................................................................................37-13
37.8.1 Accounting Types .......................................................................................37-13
37.8.2 Network Accounting ...................................................................................37-14
37.8.3 Preparations for Accounting .......................................................................37-14
37.8.4 Configuring Accounting ..............................................................................37-14
37.8.5 Monitoring AAA users .................................................................................37-14
37.8.6 Example of Configuring Accounting ...........................................................37-15
38 Radius Configuration ........................................................................................................................ 38-1
38.1 Radius Overview ......................................................................................................................38-1
38.2 RADIUS Configuration Tasks ...................................................................................................38-2
38.2.1 Configuring Radius Protocol Parameters ....................................................38-2
38.2.2 Specifying the Radius Authentication ...........................................................38-3
38.2.3 Specify Radius Private Attribute Type ..........................................................38-3
38.3 Monitoring RADIUS ..................................................................................................................38-6
38.4 Radius Configuration Example ................................................................................................38-6
39 SSH Terminal Service ....................................................................................................................... 39-1
39.1 About SSH ...............................................................................................................................39-1
39.2 SSH Support Algorithms ..........................................................................................................39-1
39.3 SSH Support ............................................................................................................................39-1
39.4 SSH Configuration ...................................................................................................................39-2
39.4.1 Default SSH Configurations .........................................................................39-2
39.4.2 User Authentication Configuration ...............................................................39-2
39.4.3 Enabling SSH SERVER ...............................................................................39-2