Overview of Security Methods
3-16 Accessing Local Management
Host Access Control Authentication (HACA) – authenticates user access of Telnet management,
console local management and WebView via a central Radius Client/Server application using the
Password screen described in Section3.8. For an overview of HACA and a description of how
to set the access policy using the Radius Configuration screen, refer to Section 3.6.1 and
Section 3.9.
Host Access Control List (ACL) – allows only the defined list of IP Addresses to communicate
with the host for Telnet, WebView (HTTP) and SNMP. To set up these parameters, refer to the
Host Access Control List (ACL) screen described in Section3.6.1.
802.1X Port Based Network Access Control – provides a mechanism for administrators to
securely authenticate and grant appropriate access to end user devices (supplicants) directly
attached to switch module ports. For more information, refer to Section 3.6.2.
MAC Authentication – provides a mechanism for administrators to securely authenticate and
grant appropriate access to end user devices directly attached to switch module ports. For more
information, refer to Section 3.6.3.
3.6.1 Host Access Control Authentication (HACA)
To use HACA, the embedded Radius Client on the switch module must be configured to
communicate with the Radius Server, and the Radius Server must be configured with the password
information. The software used for this application provides the ability to centralize the
Authentication, Authorization, and Accounting (AAA) of the network resources. For more
information, refer to the RFC 2865 (Radius Authentication) and RFC2866 (Radius Accounting)
for a description of the protocol.
Each switch module has its own Radius Client. The client can be configured via:
The Radius Configuration screen described in Section 3.9, or
The Network Tools Command Line Interface (CLI) using the “radius” command described in
Chapter 12.
The IP address of the Radius Server and the shared secret text string must be configured on the
Radius Client. The client uses the Password Authentication Protocol (PAP) to communicate the
user name and encrypted password to the Radius Server.
On the Radius Server, each user is configured with the following:
name
•password
access level