viii
AAA configuration example ······································································································································· 349
RADIUS configuration ············································································································································· 354
Introduction to RADIUS ······································································································································· 354
Client/server model ············································································································································ 354
Security and authentication mechanisms ·········································································································· 354
Basic message exchange process of RADIUS ·································································································· 355
RADIUS packet format ········································································································································ 356
Extended RADIUS attributes ······························································································································· 358
Protocols and standards ····································································································································· 359
Configuring RADIUS ···················································································································································· 359
Configuration task list ········································································································································· 359
Configuring RADIUS servers ······························································································································ 360
Configuring RADIUS parameters ······················································································································· 361
RADIUS configuration example ·································································································································· 363
Configuration guidelines ············································································································································· 369
Users ········································································································································································ 370
Configuring users ························································································································································· 370
Configuring a local user ····································································································································· 370
Configuring a user group ··································································································································· 372
PKI configuration ····················································································································································· 374
PKI overview ································································································································································· 374
PKI terms ······························································································································································· 374
Architecture of PKI ··············································································································································· 374
Applications of PKI ·············································································································································· 375
Operation of PKI ·················································································································································· 376
Configuring PKI ···························································································································································· 376
Configuration task list ········································································································································· 376
Creating a PKI entity ··········································································································································· 379
Creating a PKI domain ······································································································································· 380
Generating an RSA key pair ······························································································································ 383
Destroying the RSA key pair ······························································································································ 383
Retrieving a certificate ········································································································································ 384
Requesting a local certificate ····························································································································· 385
Retrieving and displaying a CRL ························································································································ 386
PKI configuration example ·········································································································································· 388
Configuring a PKI entity to request a certificate from a CA ··········································································· 388
Configuration guidelines ············································································································································· 393
Port isolation group configuration ·························································································································· 394
Overview ······································································································································································· 394
Configuring a port isolation group ···························································································································· 394
Port isolation group configuration example ·············································································································· 395
Authorized IP configuration ···································································································································· 397
Overview ······································································································································································· 397
Configuring authorized IP ··········································································································································· 397
Authorized IP configuration example ························································································································· 398
Authorized IP configuration example ················································································································ 398
ACL configuration ··················································································································································· 401
ACL overview ······························································································································································· 401
Introduction to IPv4 ACL ····································································································································· 401
Effective period of an ACL ································································································································· 402
ACL step ······························································································································································· 402