42-6
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Chapter 42 Configuring Web-Based Authentication
Configuring Web-Based Authentication
Configuring Web-Based Authentication
These sections describe how to configure web-based authentication:
Default Web-Based Authentication Configuration, page 42-6
Web-Based Authentication Configuration Guidelines and Restrictions, page 42-6
Web-Based Authentication Configuration Task List, page 42-7
Configuring the Authentication Rule and Interfaces, page 42-7
Configuring AAA Authentication, page 42-9
Configuring Switch-to-RADIUS-Server Communication, page 42-9
Configuring the HTTP Server, page 42-11
Configuring the Web-Based Authentication Parameters, page 42-13
Removing Web-Based Authentication Cache Entries, page 42-14

Default Web-Based Authentication Configuration

Table 42-1 shows the default web-based authentication configuration.

Web-Based Authentication Configuration Guidelines and Restrictions

When configuring web-based authentication, consider these guidelines and restrictions:
Web authentication requires two Cisco Attribute-Value (AV) pair attributes:
The first attribute, priv-lvl=15, must always be set to 15. This sets the privilege level of the user who
is logging into the switch.
The second attribute is an access list to be applied for web-authenticated hosts. The syntax is similar
to 802.1x per-user access control lists (ACLs). However, instead of ip:inacl, this attr ibute must be gin
with proxyacl, and the source field in each entry must be any. (After authentication, the client IP
address replaces the any field when the ACL is applied.)
For example:
proxyacl# 10=permit ip any 10.0.0.0 255.0.0.0
proxyacl# 20=permit ip any 11.1.0.0 255.255.0.0
proxyacl# 30=permit udp any any eq syslog
Table 42-1 Default Web-based Authentication Configuration
Feature Default Setting
AAA Disabled
RADIUS server
IP address
UDP authentication port
Key
None specified
1812
None specified
Default value of inactivity timeout 3600 seconds
Inactivity timeout Enabled