Controlling web browser interface access, When using radius authentication – HP 4100GL User Manual

Page 69

Advertising
background image

RADIUS Authentication and Accounting

Controlling Web Browser Interface Access When Using RADIUS Authentication

For local authentication, the switch uses the Operator-level and Manager-level
username/password set(s) previously configured locally on the switch. (These
are the usernames and passwords you can configure using the CLI password
command, the web browser interface, or the menu interface—which enables
only local password configuration).

If the operator at the requesting terminal correctly enters the user

-

name/password pair for either access level (Operator or Manager),
access is granted on the basis of which username/password pair was
used. For example, suppose you configure Telnet primary access for
RADIUS and Telnet secondary access for local. If a RADIUS access
attempt fails, then you can still get access to either the Operator or
Manager level of the switch by entering the correct username/pass

-

word pair for the level you want to enter.

If the username/password pair entered at the requesting terminal does
not match either local username/password pair previously configured
in the switch, access is denied. In this case, the terminal is again
prompted to enter a username/password pair. In the default configu

-

ration, the switch allows up to three attempts. If the requesting
terminal exhausts the attempt limit without a successful authentica

-

tion, the login session is terminated and the operator at the requesting
terminal must initiate a new session before trying again.

Controlling Web Browser Interface
Access When Using RADIUS
Authentication

Configuring the switch for RADIUS authentication does not affect web
browser interface access. To prevent unauthorized access through the web
browser interface, do one or more of the following:

Configure local authentication (a Manager user name and password
and, optionally, an Operator user name and password) on the switch.

Configure the switch’s Authorized IP Manager feature to allow web
browser access only from authorized management stations. (The
Authorized IP Manager feature does not interfere with TACACS+
operation.)

Disable web browser access to the switch.

3-15

Advertising