Aaa Configuration Examples; Remote Radius Authentication Of Telnet/Ssh Users - 3Com 4200G 12-Port Configuration Manual

4200g family
Hide thumbs Also See for 4200G 12-Port:
Table of Contents

Advertisement

To do...
Display buffered
non-response
stop-accounting requests
Clear HWTACACS message
statistics
Delete buffered non-response
stop-accounting requests

AAA Configuration Examples

Remote RADIUS Authentication of Telnet/SSH Users

The configuration procedure for remote authentication of SSH users by RADIUS server is similar to that
for Telnet users. The following text only takes Telnet users as example to describe the configuration
procedure for remote authentication.
Network requirements
In the network environment shown in
Telnet users logging into the switch are authenticated by the RADIUS server.
A RADIUS authentication server with IP address 10.110.91.164 is connected to the switch.
On the switch, set the shared key it uses to exchange messages with the authentication RADIUS
server to aabbcc.
A CAMS server is used as the RADIUS server. You can select extended as the server-type in a
RADIUS scheme.
On the RADIUS server, set the shared key it uses to exchange messages with the switch to
aabbcc, set the authentication port number, and add Telnet usernames and login passwords.
The Telnet usernames added to the RADIUS server must be in the format of userid@isp-name if you
have configured the switch to include domain names in the usernames to be sent to the RADIUS server
in the RADIUS scheme.
Use the command...
display stop-accounting-buffer
{ hwtacacs-scheme
hwtacacs-scheme-name
reset hwtacacs statistics { accounting |
authentication | authorization | all }
reset stop-accounting-buffer
hwtacacs-scheme
hwtacacs-scheme-name
Figure
2-1, you are required to configure the switch so that the
2-27
Remarks
Available in user
view

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4200g 24-port4200g 48-portSwitch 4800g pwr 24-port

Table of Contents