This chapter describes the following authentication and authorization commands and how to use
them. For information about using the TACACS+ authentication method for management, see
Chapter
For information about...
Overview of Authentication and Authorization Methods
Setting the Authentication Login Method
Configuring RADIUS
Configuring 802.1X Authentication
Configuring MAC Authentication
Configuring Multiple Authentication Methods
Configuring User + IP Phone Authentication
Configuring VLAN Authorization (RFC 3580)
Configuring Policy Maptable Response
Configuring MAC Locking
Configuring Port Web Authentication (PWA)
Configuring Secure Shell (SSH)
Configuring Access Lists
Overview of Authentication and Authorization Methods
The following methods are available for controlling which users are allowed to access, monitor,
and manage the switch.
•
Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local
COM port connection. For details, refer to "Setting User Accounts and Passwords" on
page 3‐2.
•
Host Access Control Authentication (HACA) – authenticates user access of Telnet
management, console local management and WebView via a central RADIUS Client/Server or
Authentication and Authorization
27, TACACS+ Configuration.
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
http://www.enterasys.com/support/manuals/
26
Configuration
Refer to page...
26-1
26-4
26-6
26-15
26-25
26-37
26-48
26-49
26-52
26-57
26-68
26-80
26-82
SecureStack C3 Configuration Guide 26-1
Need help?
Do you have a question about the SECURESTACK C3 and is the answer not in the manual?
Questions and answers