26

Authentication and Authorization

Configuration

This chapter describes the following authentication and authorization commands and how to use them. For information about using the TACACS+ authentication method for management, see Chapter 27, TACACS+ Configuration.

For information about...

Refer to page...

 

 

Overview of Authentication and Authorization Methods

26-1

 

 

Setting the Authentication Login Method

26-4

 

 

Configuring RADIUS

26-6

 

 

Configuring 802.1X Authentication

26-15

 

 

Configuring MAC Authentication

26-25

 

 

Configuring Multiple Authentication Methods

26-37

 

 

Configuring User + IP Phone Authentication

26-48

 

 

Configuring VLAN Authorization (RFC 3580)

26-49

 

 

Configuring Policy Maptable Response

26-52

 

 

Configuring MAC Locking

26-57

 

 

Configuring Port Web Authentication (PWA)

26-68

 

 

Configuring Secure Shell (SSH)

26-80

 

 

Configuring Access Lists

26-82

 

 

Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of authentication and authorization configuration is located on the Enterasys Networks web site:

http://www.enterasys.com/support/manuals/

Overview of Authentication and Authorization Methods

The following methods are available for controlling which users are allowed to access, monitor, and manage the switch.

Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local COM port connection. For details, refer to Setting User Accounts and Passwords” on page 3‐2.

Host Access Control Authentication (HACA) – authenticates user access of Telnet management, console local management and WebView via a central RADIUS Client/Server or

SecureStack C3 Configuration Guide 26-1

Page 747
Image 747
Enterasys Networks 9034313-07 manual Authentication and Authorization Configuration