Enterasys Networks 9034313-07 manual Authentication and Authorization Configuration

Models: 9034313-07

1 872
Download 872 pages 24.54 Kb
Page 747
Image 747

26

Authentication and Authorization

Configuration

This chapter describes the following authentication and authorization commands and how to use them. For information about using the TACACS+ authentication method for management, see Chapter 27, TACACS+ Configuration.

For information about...

Refer to page...

 

 

Overview of Authentication and Authorization Methods

26-1

 

 

Setting the Authentication Login Method

26-4

 

 

Configuring RADIUS

26-6

 

 

Configuring 802.1X Authentication

26-15

 

 

Configuring MAC Authentication

26-25

 

 

Configuring Multiple Authentication Methods

26-37

 

 

Configuring User + IP Phone Authentication

26-48

 

 

Configuring VLAN Authorization (RFC 3580)

26-49

 

 

Configuring Policy Maptable Response

26-52

 

 

Configuring MAC Locking

26-57

 

 

Configuring Port Web Authentication (PWA)

26-68

 

 

Configuring Secure Shell (SSH)

26-80

 

 

Configuring Access Lists

26-82

 

 

Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of authentication and authorization configuration is located on the Enterasys Networks web site:

http://www.enterasys.com/support/manuals/

Overview of Authentication and Authorization Methods

The following methods are available for controlling which users are allowed to access, monitor, and manage the switch.

Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local COM port connection. For details, refer to Setting User Accounts and Passwords” on page 3‐2.

Host Access Control Authentication (HACA) – authenticates user access of Telnet management, console local management and WebView via a central RADIUS Client/Server or

SecureStack C3 Configuration Guide 26-1

Page 747
Image 747
Enterasys Networks 9034313-07 manual Authentication and Authorization Configuration