Hwtacacs Authentication And Authorization Of Telnet Users - 3Com 4200G 12-Port Configuration Manual

4200g family
Hide thumbs Also See for 4200G 12-Port:
Table of Contents

Advertisement

Enable the local RADIUS server function, set the IP address and shared key for the network
access server to 127.0.0.1 and aabbcc, respectively.
Configure local users.

HWTACACS Authentication and Authorization of Telnet Users

Network requirements
You are required to configure the switch so that the Telnet users logging into the switch are
authenticated and authorized by the TACACS server.
A TACACS server with IP address 10.110.91.164 is connected to the switch. This server will be used as
the authentication and authorization server. On the switch, set both authentication and authorization
shared keys that are used to exchange messages with the TACACS server to aabbcc. Configure the
switch to strip domain names off usernames before sending usernames to the TACACS server.
Configure the shared key to aabbcc on the TACACS server for exchanging messages with the switch.
Network diagram
Figure 2-3 Remote HWTACACS authentication and authorization of Telnet users
Telnet user
Configuration procedure
# Add a Telnet user.
(Omitted here)
# Configure a HWTACACS scheme.
<Sysname> system-view
[Sysname] hwtacacs scheme hwtac
[Sysname-hwtacacs-hwtac] primary authentication 10.110.91.164 49
[Sysname-hwtacacs-hwtac] primary authorization 10.110.91.164 49
[Sysname-hwtacacs-hwtac] key authentication aabbcc
[Sysname-hwtacacs-hwtac] key authorization aabbcc
[Sysname-hwtacacs-hwtac] user-name-format without-domain
[Sysname-hwtacacs-hwtac] quit
# Configure the domain name of the HWTACACS scheme to hwtac.
[Sysname] domain hwtacacs
[Sysname-isp-hwtacacs] scheme hwtacacs-scheme hwtac
Authentication server
10.110.91.164/16
Internet
2-30

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4200g 24-port4200g 48-portSwitch 4800g pwr 24-port

Table of Contents