H3C Technologies H3C WX3000 Series Unified Switches User Manual

Page 14

Advertising
background image

ix

Cutting Down User Connections Forcibly......................................................................................25-7

RADIUS Configuration Task List...........................................................................................................25-8

Creating a RADIUS Scheme .........................................................................................................25-9
Configuring RADIUS Authentication/Authorization Servers ........................................................25-10
Configuring RADIUS Accounting Servers ...................................................................................25-10
Configuring Shared Keys for RADIUS Messages .......................................................................25-12
Configuring the Maximum Number of RADIUS Request Transmission Attempts.......................25-12
Configuring the Type of RADIUS Servers to be Supported ........................................................25-13
Configuring the Status of RADIUS Servers.................................................................................25-13
Configuring the Attributes of Data to be Sent to RADIUS Servers .............................................25-14
Configuring the Local RADIUS Authentication Server Function .................................................25-15
Configuring Timers for RADIUS Servers.....................................................................................25-16
Enabling Sending Trap Message when a RADIUS Server Goes Down .....................................25-16
Enabling the User Re-Authentication at Restart Function...........................................................25-17

HWTACACS Configuration Task List..................................................................................................25-18

Creating a HWTACACS Scheme ................................................................................................25-18
Configuring TACACS Authentication Servers .............................................................................25-19
Configuring TACACS Authorization Servers...............................................................................25-19
Configuring TACACS Accounting Servers ..................................................................................25-20
Configuring Shared Keys for HWTACACS Messages ................................................................25-21
Configuring the Attributes of Data to be Sent to TACACS Servers ............................................25-21
Configuring the Timers Regarding TACACS Servers .................................................................25-22

Displaying and Maintaining AAA.........................................................................................................25-23
AAA Configuration Examples..............................................................................................................25-24

Remote RADIUS Authentication of Telnet/SSH Users ...............................................................25-24
Local Authentication of FTP/Telnet Users...................................................................................25-25
HWTACACS Authentication and Authorization of Telnet Users .................................................25-26

Troubleshooting AAA ..........................................................................................................................25-27

Troubleshooting RADIUS Configuration......................................................................................25-27
Troubleshooting HWTACACS Configuration ..............................................................................25-28

28 EAD Configuration.................................................................................................................................25-1

Introduction to EAD ...............................................................................................................................25-1
Typical Network Application of EAD .............................................................................................
........25-1
EAD Configuration ................................................................................................................................25-2
EAD Configuration Example ......................................................................................................
...........25-2

29 MAC Authentication Configuration......................................................................................................29-1

MAC Authentication Overview ..............................................................................................................29-1

Performing MAC Authentication on a RADIUS Server..................................................................29-1
Performing MAC Authentication Locally........................................................................................29-1

Related Concepts..................................................................................................................................29-2

MAC Authentication Timers...........................................................................................................29-2
Quiet MAC Address..............................................................................................................
.........29-2

Configuring Basic MAC Authentication Functions ................................................................................29-2
MAC Address Authentication Enhanced Function Configuration .........................................................29-3

MAC Address Authentication Enhanced Function Configuration Tasks .......................................29-3

Advertising