EasyManua.ls Logo

Enterasys C3G124-24 - RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment

Enterasys C3G124-24
954 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Overview of Authentication and Authorization Methods
Enterasys C3 Configuration Guide 32-3
MAC Locking – locks a port to one or more MAC addresses, preventing the use of
unauthorized devices and MAC spoofing on the port For details, refer to “Configuring MAC
Locking” on page 32-61.
Port Web Authentication (PWA) – passes all login information from the end station to a
RADIUS server for authentication before allowing a user to access the network . PWA is an
alternative to 802.1X and MAC authentication. For details, refer to “Configuring Port Web
Authentication (PWA)” on page 32-77.
Secure Shell (SSH) – provides secure Telnet. For details, refer toConfiguring Secure Shell
(SSH)” on page 32-89.
TACACS+ (Terminal Access Controller Access-Control System Plus)
a security protocol
developed by Cisco Systems that can be used as an alternative to the standard RADIUS
security protocol (RFC 2865). TACACS+ runs over TCP and encrypts the body of each packet.
Refer to Chapter 36, TACACS+ Configuration, for information about the commands used to
configure TACACS+.
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment
If you configure an authentication method that requires communication with a RADIUS server,
you can use the RADIUS Filter-ID attribute to dynamically assign a policy profile and/or
management level to authenticating users and/or devices.
The RADIUS Filter-ID attribute is simply a string that is formatted in the RADIUS Access-Accept
packet sent back from the RADIUS server to the switch during the authentication process.
Each user can be configured in the RADIUS server database with a RADIUS Filter-ID attribute
that specifies the name of the policy profile and/or management level the user should be assigned
upon successful authentication. During the authentication process, when the RADIUS server
returns a RADIUS Access-Accept message that includes a Filter-ID matching a policy profile name
configured on the switch, the switch then dynamically applies the policy profile to the physical
port the user/device is authenticating on.
Filter-ID Attribute Formats
Enterasys Networks supports two Filter-ID formats — “decorated” and “undecorated.” The
decorated format has three forms:
To specify the policy profile to assign to the authenticating user (network access
authentication):
Enterasys:version=1:policy=string
where string specifies the policy profile name. Policy profile names are case-sensitive.
To specify a management level (management access authentication):
Enterasys:version=1:mgmt=level
where level indicates the management level, either ro, rw, or su.
To specify both management level and policy profile:
Enterasys:version=1:mgmt=level:policy=string
The undecorated format is simply a string that specifies a policy profile name. The undecorated
format cannot be used for management access authentication.
Decorated Filter-IDs are processed first by the switch. If no decorated Filter-IDs are found, then
undecorated Filter-IDs are processed. If multiple Filter-IDs are found that contain conflicting
values, a Syslog message is generated.

Table of Contents

Related product manuals