Telnet Login Configuration With Authentication Mode Being Scheme - 3Com 4210G Series Configuration Manual

24-port/48-port
Hide thumbs Also See for 4210G Series:
Table of Contents

Advertisement

Telnet Login Configuration with Authentication Mode Being Scheme

Configuration Procedure
Follow these steps to perform Telnet configuration (with authentication mode being scheme):
To do...
Enter system view
Enter one or more VTY
user interface views
Configure to authenticate
users locally or remotely
Configure
the
authenticati
on scheme
Create a local user and
enter local user view
Set the authentication
password for the local user
Specifies the level of the
local user
Specify the service type for
AUX users
Note that, when you log in to an Ethernet switch using the scheme authentication mode, your access
rights depend on your user level defined in the AAA scheme.
When the local authentication mode is used, the user levels are specified using the
authorization-attribute level level command.
When the RADIUS or HWTACACS authentication mode is used, the user levels are set on the
corresponding RADIUS or HWTACACS servers.
Use the command...
system-view
user-interface vty
first-number [ last-number ]
authentication-mode
scheme
Enter the
default ISP
domain domain name
domain view
authentication default
Configure
{ hwtacacs-scheme
the AAA
hwtacacs-scheme- name
scheme to
[ local ] | local | none |
be applied
radius-scheme
to the
radius-scheme-name
domain
[ local ] }
Quit to
quit
system view
local-user user-name
password { simple |
cipher } password
authorization-attribute
level level
service-type telnet
Required
The specified AAA scheme
determines whether to authenticate
users locally or remotely.
Users are authenticated locally by
default.
Optional
By default, the local AAA scheme is
applied. If you specify to apply the
local AAA scheme, you need to
perform the configuration concerning
local user as well.
If you specify to apply an existing
scheme by providing the
radius-scheme-name argument, you
need to perform the following
configuration as well:
Perform
configuration on the switch. (Refer
to
Security Volume for details.)
Configure the user name and
password accordingly on the AAA
server. (Refer to the user manual
of AAA server.)
No local user exists by default.
Required
By default, a user is authorized with
no password
By default, no authorization attribute
is configured for a local user
Required
By default, a user is authorized with
no service
3-8
Remarks
AAA-RADIUS
AAA
Configuration
in
the

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4210g nt4210g pwr

Table of Contents