EasyManuals Logo

Enterasys C5G124-24 User Manual

Enterasys C5G124-24
452 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #141 background imageLoading...
Page #141 background image
Fixed Switch Configuration Guide 10-1
10
Configuring User Authentication
This chapter describes the user authentication methods supported by Enterasys fixed switch
platforms.
User Authentication Overview
Authentication is the ability of a network access server, with a database of valid users and devices,
to acquire and verify the appropriate credentials of a user or device (supplicant) attempting to
gain access to the network. Enterasys authentication uses the RADIUS protocol to control access to
switch ports from an authentication server and to manage the message exchange between the
authenticating device and the server.
Both MultiAuth and multi-user authentication are supported. MultiAuth is the ability to configure
multiple authentication modes for a user and apply the authentication mode with the highest
precedence. Multi-user is the ability to appropriately authenticate multiple supplicants on a single
link and provision network resources, based upon an appropriate policy for each supplicant. The
Enterasys fixed switch products support the following authentication methods:
• IEEE 802.1x
• MAC-based Authentication (MAC)
• Port Web Authentication (PWA)
Enterasys switch products support the configuration of up to three simultaneous authentication
methods per user, with a single authentication method applied based upon MultiAuth
authentication precedence.
Network resources represent a major capital investment for your organization and can be
vulnerable to both undesired resource usage and malicious intent from outside users.
Authentication provides you with a user validation function which assures that the supplicant
requesting access has the right to do so and is a known entity. To the degree a supplicant is not a
known entity, access can be denied or granted on a limited basis. The ability of authentication to
both validate a user’s identity and define the resources available to the user assures that valuable
network resources are being used for the purposes intended by the network administrator.
For information about... Refer to page...
User Authentication Overview 10-1
Configuring Authentication 10-12
Authentication Configuration Example 10-25
Terms and Definitions 10-28

Table of Contents

Other manuals for Enterasys C5G124-24

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Enterasys C5G124-24 and is the answer not in the manual?

Enterasys C5G124-24 Specifications

General IconGeneral
BrandEnterasys
ModelC5G124-24
CategorySwitch
LanguageEnglish

Related product manuals