User`s guide
BLACK BOX® CS Installation, Administration, and User’s Guide 217
The following is a summary of the things you need to know about setting up
authentication servers.
• CS must be on the same subnet as the authentication server.
• Each authentication server must be configured and operational.
• The CS administrator should obtain the necessary information from each
authentication server administrator, in order set up and identify those
servers on CS.
For example, if LDAP authentication were to be used for logins to CS and
Kerberos for logins to serial ports, then CS needs to have network access to an
LDAP and a Kerberos authentication server. The administrator needs to
perform setup on CS for both types of authentication servers.
The administrator completes the appropriate form through the Web Manger
Expert > Security > Authentication to setup an authentication server for every
authentication method to be used by CS and its ports.
The following table lists the procedures that apply to each authentication
method.
Table 9-4: Tasks for Setting up Authentication Servers.
Method Variations Procedures
RADIUS RADIUS, Local/RADIUS, RADIUS/
Local, or RADIUS/DownLocal
See “To Configure a
RADIUS Authentication
Server” on page 218
TACACS+ TACACS+, Local/TACACS+,
TACACS+/Local, or TACACS+/
DownLocal
See “To Configure a
TACACS+
Authentication Server”
on page 219
LDAP LDAP, LDAP/Local, or
LDAPDownLocal
See “To Configure an
LDAP Authentication
Server” on page 221
Kerberos Kerberos, Kerberos/Local, or
KerberosDownLocal
See “To Configure a
Kerberos Authentication
Server” on page 223