A controlled port is configured by management to be in one of three states:
ForceUnauthorized
The port is set to the unauthorized state.
ForceAuthorized
The port is set to the authorized state.
Auto | The port’s state will be set based on the outcome of authentication exchanges |
| between the Supplicant, Authenticator and the Authentication server. This is the |
| default port state when |
Local authentication
Local authentication matches a user ID/password combination received from the supplicant to the switch module’s local database. The switch module will transmit an
/NOTE
The switch module’s Authenticator supports only the
RADIUS authentication
When Remote Authentication
Secure Shell (SSH)
Interactive login is widely used as a means to control and/or configure an entity across a network. For decades the Telnet protocol, and its cousin rlogin, have provided this capability. However, these protocols permit the transmission of sensitive information over unprotected networks. The current standard for providing interactive login in a secure fashion is the Secure SHell (SSH).
Table 2. Secure Shell Feature Details
SSH Feature | Component Type | |
|
| |
Connection Type | Interactive Login | |
|
| |
Authentication Method | Password | |
|
|
|
Ciphers | • | |
| • | |
| • | |
| • | |
|
|
|
36 | Intel® Blade Server Ethernet Switch Module IXM5414E |