Specifications

Enterasys Matrix N Standalone (NSA) Series Configuration Guide 25-1
25
Authentication Configuration
Thischapterdescribesthesetofcommandsforsupportedauthenti cationmethods.
Overview of Authentication Methods
Thefollowingauthentication methodsareavailableforcontrollingwhichusersareallowedto
access,monitor,andmanagethedevice.
802.1XNetworkAccessControlusedforcontrollingaccesstonetworkresourcesonaper
port,peruser,orperendstationbasis.Formoredetails,refertoConfiguring802.1X
Authentication
onpage 252.
•PortWebAuthentication(PWA)usedforcontrollingaccesstonetworkresourcesonaper
userbasisviaHTTP.Fordetails,refertoConfiguringPortWebAuthentication(PWA)on
page 2511.
•MACAuthenticationusedforcontrollingaccesstonetworkresourcesonaperMAC
addressbasis.
Fordetails,refertoConfiguringMACAuthenticationonpage 2526.
ConvergenceEndPoint(CEP)ConvergenceEndpoint(CEP)detectionisanEnterasys
NetworksmechanismforidentifyingIPphonesthatareconnectedtoagivenswitch.Whenan
endpointisdiscovered,apolicyisthenassignedtotheendpoint.Fordetails,
referto
ConfiguringConvergenceEndPoints(CEP)PhoneDetectiononpage 2539.
For information about... Refer to page...
Overview of Authentication Methods 25-1
Configuring 802.1X Authentication 25-2
Configuring Port Web Authentication (PWA) 25-11
Configuring MAC Authentication 25-26
Configuring Convergence End Points (CEP) Phone Detection 25-39
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment 25-50
Setting the Authentication Login Method 25-50
Configuring RADIUS 25-53
Configuring RFC 3580 25-60
Configuring TACACS+ 25-63
Note: An Enterasys Feature Guide document that contains a complete discussion on authentication
configuration exists at the following Enterasys web site: http://www.enterasys.com/support/
manuals/