Switch User Manual
SecureStack C3 Configuration Guide 26-1
26
Authentication and Authorization
Configuration
Thischapterdescribesthefollowingauthenticationandaut horizationcommandsandhowtouse
them.ForinformationaboutusingtheTACACS+authenticati onmethodformanagement,see
Chapter 27,TACACS+Configuration.
Overview of Authentication and Authorization Methods
Thefollowingmethodsareavailableforcontrollingwhichusersareallowedtoaccess,monitor,
andmanagetheswitch.
•Loginuseraccountsandpasswords–usedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,referto“SettingUserAccountsandPasswords”on
page 3 ‐2.
•HostAccessControlAuthentication(HACA)–authenticatesuseraccessofTelnet
management,consolelocalmanagementandWebViewviaacentralRADIUSClient/Serveror
For information about... Refer to page...
Overview of Authentication and Authorization Methods 26-1
Setting the Authentication Login Method 26-4
Configuring RADIUS 26-6
Configuring 802.1X Authentication 26-15
Configuring MAC Authentication 26-25
Configuring Multiple Authentication Methods 26-37
Configuring User + IP Phone Authentication 26-48
Configuring VLAN Authorization (RFC 3580) 26-49
Configuring Policy Maptable Response 26-52
Configuring MAC Locking 26-57
Configuring Port Web Authentication (PWA) 26-68
Configuring Secure Shell (SSH) 26-80
Configuring Access Lists 26-82
Note: An Enterasys Networks Feature Guide document containing an in-depth discussion of
authentication and authorization configuration is located on the Enterasys Networks web site:
http://www.enterasys.com/support/manuals/