IBM RackSwitch G8000 Application Manual page 6

A top-of-rack (tor) switch
Hide thumbs Also See for RackSwitch G8000:
Table of Contents

Advertisement

6
RackSwitch G8000: Application Guide
Chapter 4. Securing Administration . . . . . . . . . . . . . . . . 55
Secure Shell and Secure Copy . . . . . . . . . . . . . . . . . . . 55
Using SSH and SCP Client Commands . . . . . . . . . . . . . . 56
SecurID Support . . . . . . . . . . . . . . . . . . . . . . . 59
End User Access Control . . . . . . . . . . . . . . . . . . . . . 60
Strong Passwords . . . . . . . . . . . . . . . . . . . . . . 60
User Access Control . . . . . . . . . . . . . . . . . . . . . 61
Listing Current Users . . . . . . . . . . . . . . . . . . . . . 61
Logging into an End User Account . . . . . . . . . . . . . . . . 62
RADIUS Authentication and Authorization. . . . . . . . . . . . . . . 63
How RADIUS Authentication Works . . . . . . . . . . . . . . . 63
Configuring RADIUS on the Switch . . . . . . . . . . . . . . . . 64
Switch User Accounts . . . . . . . . . . . . . . . . . . . . . 65
TACACS+ Authentication . . . . . . . . . . . . . . . . . . . . . 66
How TACACS+ Authentication Works. . . . . . . . . . . . . . . 66
Command Authorization and Logging . . . . . . . . . . . . . . . 68
LDAP Authentication and Authorization. . . . . . . . . . . . . . . . 69
EAPoL Authentication Process . . . . . . . . . . . . . . . . . . . 73
EAPoL Message Exchange . . . . . . . . . . . . . . . . . . . . 73
EAPoL Port States . . . . . . . . . . . . . . . . . . . . . . . . 75
Guest VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Supported RADIUS Attributes . . . . . . . . . . . . . . . . . . . 76
EAPoL Configuration Guidelines . . . . . . . . . . . . . . . . . . 78
. . . . . . . . . . . . . . . . . . . 53
. . . . . . . . . . . . 58
. . . . . . . . . . . . . 72
. . . . . . . . 58

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents