Alteon Application Switch Operating System Application Guide
Table of Contents
24 Document ID: RDWR-ALOS-V2900_AG1302
RADIUS Authentication and Authorization ................................................................. 62
RADIUS Authentication Features ........................................................................................ 62
How RADIUS Authentication Works .................................................................................... 63
Configuring RADIUS Authentication in Alteon ..................................................................... 63
User Accounts ..................................................................................................................... 64
RADIUS Attributes for User Privileges ................................................................................ 65
TACACS+ Authentication ........................................................................................... 67
How TACACS+ Authentication Works ................................................................................ 67
TACACS+ Authentication Features ..................................................................................... 67
Authorization ....................................................................................................................... 68
Accounting .......................................................................................................................... 69
Configuring TACACS+ Authentication ................................................................................ 69
Secure Shell and Secure Copy .................................................................................. 70
Configuring SSH and SCP Features ................................................................................... 71
Configuring the SCP Administrator Password ..................................................................... 72
SCP Services ...................................................................................................................... 72
Using SSH and SCP Client Commands .............................................................................. 73
SSH and SCP Encryption of Management Messages ........................................................ 74
Generating RSA Host and Server Keys for SSH Access .................................................... 74
SSH/SCP Integration with RADIUS Authentication ............................................................. 75
SSH/SCP Integration With SecurID .................................................................................... 75
End User Access Control ........................................................................................... 76
Considerations for Configuring End User Accounts ............................................................ 76
User Access Control Menu .................................................................................................. 76
Setting up User IDs ............................................................................................................. 77
Defining User Names and Passwords ................................................................................. 77
Changing Passwords .......................................................................................................... 77
Defining User Access Level ................................................................................................ 77
Assigning One or More Real Servers to the End User ........................................................ 78
Validating User Configuration .............................................................................................. 78
Listing Current Users ........................................................................................................... 78
Enabling or Disabling a User ............................................................................................... 79
Logging into an End User Account ...................................................................................... 79
Disabling a User Account .................................................................................................... 79
Deny Routes ............................................................................................................... 79
Configuring a Deny Route ................................................................................................... 80
Viewing a Deny Route ......................................................................................................... 80
Chapter 4 – VLANs.................................................................................................. 81
VLAN ID Numbers ...................................................................................................... 81
VLAN Tagging ............................................................................................................ 81
VLANs and the IP Interfaces ...................................................................................... 82
VLAN Topologies and Design Issues ......................................................................... 82
VLANs and Default Gateways .................................................................................... 85