© Copyright Lenovo 2017 Chapter 5: Authentication & Authorization Protocols 103
RADIUS Attributes for Enterprise NOS User Privileges
Whentheuserlogsin,theswitchauthenticateshis/herlevelofaccessbysending
theRADIUSaccessrequest,thatis,theclientauthenticationrequest,tothe
RADIUSauthenticationserver.
Iftheremoteuserissuccessfullyauthenticatedbytheauthenticationserver,the
switchwillverifytheprivilegesoftheremoteuserand
authorizetheappropriate
access.Theadministratorhastwooptions:toallowbackdooraccessviaTelnet,SSH,
HTTP,orHTTPS;toallowsecurebackdooraccessviaconsole,Telnet,SSH,orBBI.
Securebackdoorprovidesaccesstothe switchwhentheRADIUSserverscannotbe
reached.
ThedefaultCN 4093settingforbackdoorand
securebackdooraccessisdisabled.
Backdooraccessisalwaysenabledontheconsoleport.
Irrespectiveofbackdoorbeingenabledornot,youcanalwaysaccessthe switchvia
theconsoleportbyusingnoradiusasradiususername.Youcanthenenterthe
usernameandpasswordconfiguredontheswitch.Ifyou
aretryingtoconnectvia
SSH/Telnet/HTTP/HTTPS,therearetwopossibilities:
Backdoorisenabled:Theswitchactslikeitisconnectingviaconsole.
Securebackdoorisenabled:Youmustentertheusername:noradius.The
switchchecksifRADIUSserverisreachable.Ifitisreachable,thenyoumust
authenticateviaremoteauthenticationserver.OnlyifRADIUSserverisnot
reachable,youwillbepromptedforlocaluser/passwordtobeauthenticated
againsttheselocal
credentials.
Alluserprivileges,otherthanthoseassignedtotheAdministrator,havetobe
definedintheRADIUSdictionary.RADIUSattribute6whichisbuiltintoall
RADIUSserversdefinestheadministrator.Thefilenameofthedictionaryis
RADIUSvendor‐dependent.ThefollowingRADIUSattributesaredefinedfor
EnterpriseNOS
userprivilegeslevels:
Table 8.
EnterpriseNOS‐proprietaryAttributesforRADIUS
User Name/Access User-Service-Type Value
User Vendor‐supplied 255
Operator Vendor‐supplied 252
Administrator(USERID) Vendor‐supplied 6