EasyManua.ls Logo

Enterasys C3G124-24 - Authentication and Authorization Configuration; Overview of Authentication and Authorization Methods

Enterasys C3G124-24
954 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Enterasys C3 Configuration Guide 32-1
32
Authentication and Authorization
Configuration
This chapter describes the following authentication and authorization commands and how to use
them. For information about using the TACACS+ authentication method for management, see
Chapter 36, TACACS+ Configuration.
Overview of Authentication and Authorization Methods
The following methods are available for controlling which users are allowed to access, monitor,
and manage the switch.
Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local
COM port connection. For details, refer to Chapter 5, Setting User Accounts and Passwords.
Host Access Control Authentication (HACA) – authenticates user access of Telnet
management, console local management and WebView via a central RADIUS Client/Server or
TACACS+ application. When RADIUS or TACACS+ is enabled, this essentially overrides login
user accounts. When HACA is active per a valid RADIUS or TACACS+ configuration, the user
names and passwords used to access the switch via Telnet, SSH, WebView, and COM ports
For information about... Refer to page...
Overview of Authentication and Authorization Methods 32-1
Setting the Authentication Login Method 32-4
Configuring RADIUS 32-6
Configuring 802.1X Authentication 32-19
Configuring MAC Authentication 32-29
Configuring Multiple Authentication Methods 32-41
Configuring User + IP Phone Authentication 32-52
Configuring VLAN Authorization (RFC 3580) 32-53
Configuring Policy Maptable Response 32-56
Configuring MAC Locking 32-61
Configuring Port Web Authentication (PWA) 32-77
Configuring Secure Shell (SSH) 32-89
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
https://extranet.enterasys.com/downloads/

Table of Contents

Related product manuals