Outline of the Steps for Configuring RADIUS Authentication

. 3-6

1. Configure Authentication for the Access Methods You Want

 

RADIUS To Protect

. 3-8

2. Configure the Switch To Access a RADIUS Server

3-10

3. Configure the Switch’s Global RADIUS Parameters

3-12

Local Authentication Process

3-14

Controlling Web Browser Interface Access

When Using RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 3-15

Configuring RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16 Operating Rules for RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . 3-17

Steps for Configuring RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . 3-18 1. Configure the Switch To Access a RADIUS Server . . . . . . . . . 3-19

2. Configure Accounting Types and the Controls for

Sending Reports to the RADIUS Server . . . . . . . . . . . . . . . . 3-20 3. (Optional) Configure Session Blocking and

Interim Updating Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22

Viewing RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23

General RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23

RADIUS Authentication Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25

RADIUS Accounting Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26

Changing RADIUS-Server Access Order . . . . . . . . . . . . . . . . . . . . . . . 3-27

Messages Related to RADIUS Operation . . . . . . . . . . . . . . . . . . . . . . . 3-29

4 Configuring Secure Shell (SSH)

Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Prerequisite for Using SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Public Key Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5

Steps for Configuring and Using SSH for Switch and Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5

General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Configuring the Switch for SSH Operation . . . . . . . . . . . . . . . . . . . . . . 4-9

v

Page 7
Image 7
HP 4100gl manual Controlling Web Browser Interface Access, When Using Radius Authentication