Chapter 9 Configuring Switch-Based Authentication

Controlling Switch Access with RADIUS

Figure 9-2 Transitioning from RADIUS to TACACS+ Services

Remote

PC

R1

R2

T1

T2

RADIUS server

RADIUS server

TACACS+ server

TACACS+ server

Workstation

86891

RADIUS Operation

When a user attempts to log in and authenticate to a switch that is access controlled by a RADIUS server, these events occur:

1.The user is prompted to enter a username and password.

2.The username and encrypted password are sent over the network to the RADIUS server.

3.The user receives one of these responses from the RADIUS server:

a.ACCEPT—The user is authenticated.

b.REJECT—The user is either not authenticated and is prompted to re-enter the username and password, or access is denied.

c.CHALLENGE—A challenge requires additional data from the user.

d.CHALLENGE PASSWORD—A response requests the user to select a new password.

The ACCEPT or REJECT response is bundled with additional data that is used for privileged EXEC or network authorization. Users must first successfully complete RADIUS authentication before proceeding to RADIUS authorization, if it is enabled. The additional data included with the ACCEPT or REJECT packets includes these items:

Telnet, SSH, rlogin, or privileged EXEC services

Connection parameters, including the host or client IP address, access list, and user timeouts

Catalyst 3750-E and 3560-E Switch Software Configuration Guide

 

OL-9775-02

9-19

 

 

 

Page 221
Image 221
Cisco Systems 3750E manual Radius Operation, Transitioning from Radius to TACACS+ Services