C
ONFIGURING

THE

S

WITCH

3-30

Configuring Local/Remote Logon Authentication

Use the Authentication Settings menu to restrict management access based
on specified user names and passwords. You can manually configure access
rights on the switch, or you can use a remote access authentication server
based on the RADIUS protocol.
Remote Authentication
Dial-in User Service
(RADIUS) is a logon
authentication protocol
that uses software
running on a central
server to control access
to RADIUS-compliant
devices on the network.
An authentication server contains a database of multiple user name/
password pairs with associated privilege levels for each user that requires
management access to the switch.
Command Usage
By default, management access is always checked against the
authentication database stored on the local switch. If a remote
authentication server is used, you must specify the authentication
sequence and the corresponding parameters for the remote
authentication protocol. Local and remote logon authentication control
management access via the console port, web browser, or Telnet.
RADIUS uses UDP, which only offers best effort delivery. Also,
RADIUS encrypts only the password in the access-request packet from
the client to the server.
RADIUS logon authentication assigns a specific privilege level for each
user name/password pair. The user name, password, and privilege level
must be configured on the authentication server.
You can specify one to two authentication methods for any user to
indicate the authentication sequence. For example, if you select
Web
Telnet
RADIUS
server
console
1. Client attempts management access.
2. Switch contacts authentication server.
3. Authentication server challenges client.
4. Client responds with proper password or key.
5. Authentication server approves access.
6. Switch grants management access.