Enterasys Matrix DFE-Gold Series Configuration Guide 25-1
25
Authentication Configuration
Thischapterdescribesthesetofcommandsforsupportedauthenti cationmethods.
Overview of Authentication Methods
Thefollowingauthentication methodsareavailableforcontrollingwhichusersareallowedto
access,monitor,andmanagethedevice.
• 802.1XNetworkAccessControl—usedforcontrollingaccesstonetworkresourcesonaper
port,peruser,orperendstationbasis.Formoredetails,referto“Configuring802.1X
Authentication”
onpage 25‐2.
•PortWebAuthentication(PWA)—usedforcontrollingaccesstonetworkresourcesonaper
userbasisviaHTTP.Fordetails,referto“ConfiguringPortWebAuthentication(PWA)”on
page 25‐11.
•MACAuthentication—usedforcontrollingaccesstonetworkresourcesonaperMAC
addressbasis.
Fordetails,referto“ConfiguringMACAuthentication”onpage 25‐26.
• ConvergenceEndPoint(CEP)—ConvergenceEndpoint(CEP)detectionisanEnterasys
NetworksmechanismforidentifyingIPphonesthatareconnectedtoagivenswitch.Whenan
endpointisdiscovered,apolicyisthenassignedtotheendpoint.Fordetails,
referto
“ConfiguringConvergenceEndPoints(CEP)PhoneDetection”onpage 25‐39.
For information about... Refer to page...
Overview of Authentication Methods 25-1
Configuring 802.1X Authentication 25-2
Configuring Port Web Authentication (PWA) 25-11
Configuring MAC Authentication 25-26
Configuring Convergence End Points (CEP) Phone Detection 25-39
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment 25-50
Setting the Authentication Login Method 25-50
Configuring RADIUS 25-53
Configuring RFC 3580 25-60
Configuring TACACS+ 25-63
Note: An Enterasys Feature Guide document that contains a complete discussion on authentication
configuration exists at the following Enterasys web site: http://www.enterasys.com/support/
manuals/