RADIUS server
Web
Telnet
1. Client attempts management access.
2. Switch contacts authentication server.
3. Authentication server challenges client.
4. Client responds with proper password or key.
5. Authentication server approves access.
6. Switch grants management access.
console

CONFIGURING THE SWITCH

Configuring Local/Remote Logon Authentication

Use the Authentication Settings menu to restrict management access based on specified user names and passwords. You can manually configure access rights on the switch, or you can use a remote access authentication server based on the RADIUS protocol.

Remote Authentication

Dial-in User Service (RADIUS) is a logon authentication protocol

that uses software running on a central

server to control access to RADIUS-compliant devices on the network.

An authentication server contains a database of multiple user name/ password pairs with associated privilege levels for each user that requires management access to the switch.

Command Usage

By default, management access is always checked against the authentication database stored on the local switch. If a remote authentication server is used, you must specify the authentication sequence and the corresponding parameters for the remote authentication protocol. Local and remote logon authentication control management access via the console port, web browser, or Telnet.

RADIUS uses UDP, which only offers best effort delivery. Also, RADIUS encrypts only the password in the access-request packet from the client to the server.

RADIUS logon authentication assigns a specific privilege level for each user name/password pair. The user name, password, and privilege level must be configured on the authentication server.

You can specify one to two authentication methods for any user to indicate the authentication sequence. For example, if you select

3-30

Page 78
Image 78
SMC Networks SMC6724L3 manual Configuring Local/Remote Logon Authentication, Command Usage