Enterasys C3 Configuration Guide 32-1
32
Authentication and Authorization
Configuration
This chapter describes the following authentication and authorization commands and how to use
them. For information about using the TACACS+ authentication method for management, see
Chapter 36, TACACS+ Configuration.
Overview of Authentication and Authorization Methods
The following methods are available for controlling which users are allowed to access, monitor,
and manage the switch.
• Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local
COM port connection. For details, refer to Chapter 5, Setting User Accounts and Passwords.
• Host Access Control Authentication (HACA) – authenticates user access of Telnet
management, console local management and WebView via a central RADIUS Client/Server or
TACACS+ application. When RADIUS or TACACS+ is enabled, this essentially overrides login
user accounts. When HACA is active per a valid RADIUS or TACACS+ configuration, the user
names and passwords used to access the switch via Telnet, SSH, WebView, and COM ports
For information about... Refer to page...
Overview of Authentication and Authorization Methods 32-1
Setting the Authentication Login Method 32-4
Configuring RADIUS 32-6
Configuring 802.1X Authentication 32-19
Configuring MAC Authentication 32-29
Configuring Multiple Authentication Methods 32-41
Configuring User + IP Phone Authentication 32-52
Configuring VLAN Authorization (RFC 3580) 32-53
Configuring Policy Maptable Response 32-56
Configuring MAC Locking 32-61
Configuring Port Web Authentication (PWA) 32-77
Configuring Secure Shell (SSH) 32-89
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
https://extranet.enterasys.com/downloads/