Enterasys B5 CLI Reference 22-1
22
Authentication and Authorization
Configuration
Thischapterdescribesthefollowingauthenticationandauthorizationcommandsandhowtouse
them.ForinformationaboutusingtheTACACS+authenticationmethodformanagement,see
Chapter 23,TACACS+Configuration.
Overview of Authentication and Authorization Methods
Thefollowingmethodsareavailableforcontrollingwhichusersareallowedtoaccess,monitor,
andmanagetheswitch.
•Loginuseraccountsandpasswords–usedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,referto“SettingUserAccountsandPasswords” on
page 3 ‐2.
•HostAccessControlAuthentication(HACA)–a uthenti catesuseraccessofTelnet
management,consolelocalmanagementand WebViewviaacentralRADIUSClient/Serveror
For information about... Refer to page...
Overview of Authentication and Authorization Methods 22-1
Setting the Authentication Login Method 22-4
Configuring RADIUS 22-6
Configuring 802.1X Authentication 22-15
Configuring MAC Authentication 22-25
Configuring Multiple Authentication Methods 22-37
Configuring User + IP Phone Authentication 22-48
Configuring VLAN Authorization (RFC 3580) 22-49
Configuring Policy Maptable Response 22-52
Configuring MAC Locking 22-57
Configuring Port Web Authentication (PWA) 22-68
Configuring Secure Shell (SSH) 22-80
Configuring Access Lists 22-82
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
https://extranet.enterasys.com/downloads/