Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual
Page 13

Software Reference for x310 Series Switches
C613-50046-01 REV A
AlliedWare Plus
TM
Operating System - Version 5.4.4C
xiii
Authentication Introduction and Configuration
802.1X-Authentication ............................................................................................................................................... 42.3
Web-Authentication.................................................................................................................................................... 42.4
What is Web-Authentication? ........................................................................................................................... 42.4
Web-Authentication Basics................................................................................................................................ 42.4
Configuring Web-Authentication.................................................................................................................... 42.6
Starting a Web-Authentication Session ........................................................................................................ 42.8
Support for Protocols Underlying Web-Authentication .......................................................................42.10
Web-Authentication Timeout Connect .......................................................................................................42.14
Web Authorization Proxy..................................................................................................................................42.15
Why is MAC-Authentication Required? .......................................................................................................42.16
How Does MAC-Authentication Work? .......................................................................................................42.16
Configuring MAC-Authentication .................................................................................................................42.17
Tri-Authentication ......................................................................................................................................................42.18
Tri-Authentication Configuration .........................................................................................................................42.19
Two-step Authentication.........................................................................................................................................42.21
Ensuring Authentication Methods Require Different Usernames and Passwords .............................42.22
Roaming Authentication .........................................................................................................................................42.23
Roaming Authentication Overview ..............................................................................................................42.24
Roaming Authentication Feature Interactions .........................................................................................42.25
Deciding When a Supplicant Fails Authentication..................................................................................42.28
Failed Authentication VLAN ............................................................................................................................42.29
Limitations on Allowed Feature Combinations........................................................................................42.29
AAA Introduction and Configuration
Available functions and server types.............................................................................................................. 44.2
Server Groups and Method Lists ...................................................................................................................... 44.3
Sample 802.1X Authentication Configuration............................................................................................ 44.7
Sample MAC Authentication Configuration................................................................................................ 44.8
Sample Web-Authentication Configuration................................................................................................ 44.9
Sample Tri-Authentication Configuration ..................................................................................................44.10