Chapter 26: Authentication And Authorization Configuration; Overview Of Authentication And Authorization Methods - Enterasys SECURESTACK C3 Configuration Manual

Stackable switches
Hide thumbs Also See for SECURESTACK C3:
Table of Contents

Advertisement

This chapter describes the following authentication and authorization commands and how to use 
them. For information about using the TACACS+ authentication method for management, see 
Chapter
For information about...

Overview of Authentication and Authorization Methods

Setting the Authentication Login Method
Configuring RADIUS
Configuring 802.1X Authentication
Configuring MAC Authentication
Configuring Multiple Authentication Methods
Configuring User + IP Phone Authentication
Configuring VLAN Authorization (RFC 3580)
Configuring Policy Maptable Response
Configuring MAC Locking
Configuring Port Web Authentication (PWA)
Configuring Secure Shell (SSH)
Configuring Access Lists
Overview of Authentication and Authorization Methods
The following methods are available for controlling which users are allowed to access, monitor, 
and manage the switch. 
Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local 
COM port connection. For details, refer to "Setting User Accounts and Passwords" on 
page 3‐2.
Host Access Control Authentication (HACA) – authenticates user access of Telnet 
management, console local management and WebView via a central RADIUS Client/Server or 
Authentication and Authorization
27, TACACS+ Configuration.
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
http://www.enterasys.com/support/manuals/
26
Configuration
Refer to page...
26-1
26-4
26-6
26-15
26-25
26-37
26-48
26-49
26-52
26-57
26-68
26-80
26-82
SecureStack C3 Configuration Guide 26-1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents