EasyManua.ls Logo

Enterasys b5

Enterasys b5
714 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Enterasys B5 CLI Reference 22-1
22
Authentication and Authorization
Configuration
Thischapterdescribesthefollowingauthenticationandauthorizationcommandsandhowtouse
them.ForinformationaboutusingtheTACACS+authenticationmethodformanagement,see
Chapter 23,TACACS+Configuration.
Overview of Authentication and Authorization Methods
Thefollowingmethodsareavailableforcontrollingwhichusersareallowedtoaccess,monitor,
andmanagetheswitch.
•LoginuseraccountsandpasswordsusedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,refertoSettingUserAccountsandPasswords on
page 3 2.
•HostAccessControlAuthentication(HACA)a uthenti catesuseraccessofTelnet
management,consolelocalmanagementand WebViewviaacentralRADIUSClient/Serveror
For information about... Refer to page...
Overview of Authentication and Authorization Methods 22-1
Setting the Authentication Login Method 22-4
Configuring RADIUS 22-6
Configuring 802.1X Authentication 22-15
Configuring MAC Authentication 22-25
Configuring Multiple Authentication Methods 22-37
Configuring User + IP Phone Authentication 22-48
Configuring VLAN Authorization (RFC 3580) 22-49
Configuring Policy Maptable Response 22-52
Configuring MAC Locking 22-57
Configuring Port Web Authentication (PWA) 22-68
Configuring Secure Shell (SSH) 22-80
Configuring Access Lists 22-82
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
https://extranet.enterasys.com/downloads/

Table of Contents