Radius Server Feature Of The Switch - HP 3600 v2 Series Security Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Portal users—Users who must pass portal authentication to access the network.
In addition, AAA provides the following services for login users to enhance switch security:
Command authorization—Enables the NAS to defer to the authorization server to determine
whether a command entered by a login user is permitted for the user, making sure that login users
execute only commands they are authorized to execute. For more information about command
authorization, see Fundamentals Configuration Guide.
Command accounting—Allows the accounting server to record all commands executed on the
switch or all authorized commands successfully executed. For more information about command
accounting, see Fundamentals Configuration Guide.
Level switching authentication—Allows the authentication server to authenticate users who perform
privilege level switching. As long as passing level switching authentication, users can switch their
user privilege levels, without logging out and disconnecting current connections. For more
information about user privilege level switching, see Fundamentals Configuration Guide.
You can configure different authentication, authorization, and accounting methods for different types of
users in a domain. See

RADIUS server feature of the switch

Generally, the RADIUS server runs on a computer or workstation, and the RADIUS client runs on a NAS.
A network device that supports the RADIUS server feature can also serve as the RADIUS server, working
with RADIUS clients to implement user authentication, authorization, and accounting. As shown in
8, the RADIUS server and client can reside on the same switch or different switches.
Using a network device as the RADIUS server simplifies networking and reduces deployment costs. This
implementation is usually deployed on networks by using the clustering feature. In such a scenario,
configure the RADIUS server feature on a management device at the distribution layer, so that the device
functions as a RADIUS server to cooperate with cluster member switches at the access layer to provide
user authentication and authorization services.
Figure 8 Devices functioning as a RADIUS server
A network device serving as the RADIUS server can provide the following functions:
User information management—Supports creating, modifying, and deleting user information,
including the username, password, authority, lifetime, and user description.
RADIUS client information management—Supports creating, and deleting RADIUS clients, which
are identified by IP addresses and configured with attributes such as a shared key. After being
"Configuring AAA methods for ISP
10
domains."
Figure

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents