ii
AAA Configuration Examples················································································································2-27
Remote RADIUS Authentication of Telnet/SSH Users ·································································2-27
Local Authentication of FTP/Telnet Users·····················································································2-28
HWTACACS Authentication and Authorization of Telnet Users ···················································2-30
Troubleshooting AAA ····························································································································2-31
Troubleshooting RADIUS Configuration························································································2-31
Troubleshooting HWTACACS Configuration ················································································2-31
3 EAD Configuration·····································································································································3-1
Introduction to EAD·································································································································3-1
Typical Network Application of EAD ·······································································································3-1
EAD Configuration ··································································································································3-2
EAD Configuration Example ···················································································································3-3