beautypg.com

Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 13

background image

Software Reference for x310 Series Switches

C613-50046-01 REV A

AlliedWare Plus

TM

Operating System - Version 5.4.4C

xiii

Chapter 42:

Authentication Introduction and Configuration

Authentication Introduction .................................................................................................................................... 42.2

Configuring a Guest VLAN.................................................................................................................................. 42.2

802.1X-Authentication ............................................................................................................................................... 42.3
Web-Authentication.................................................................................................................................................... 42.4

What is Web-Authentication? ........................................................................................................................... 42.4
Web-Authentication Basics................................................................................................................................ 42.4
Configuring Web-Authentication.................................................................................................................... 42.6
Starting a Web-Authentication Session ........................................................................................................ 42.8
Support for Protocols Underlying Web-Authentication .......................................................................42.10
Web-Authentication Timeout Connect .......................................................................................................42.14
Web Authorization Proxy..................................................................................................................................42.15

MAC-Authentication..................................................................................................................................................42.16

Why is MAC-Authentication Required? .......................................................................................................42.16
How Does MAC-Authentication Work? .......................................................................................................42.16
Configuring MAC-Authentication .................................................................................................................42.17

Tri-Authentication ......................................................................................................................................................42.18
Tri-Authentication Configuration .........................................................................................................................42.19
Two-step Authentication.........................................................................................................................................42.21
Ensuring Authentication Methods Require Different Usernames and Passwords .............................42.22
Roaming Authentication .........................................................................................................................................42.23

Roaming Authentication Overview ..............................................................................................................42.24
Roaming Authentication Feature Interactions .........................................................................................42.25

Unauthenticated Supplicant Traffic.....................................................................................................................42.26

Deciding When a Supplicant Fails Authentication..................................................................................42.28
Failed Authentication VLAN ............................................................................................................................42.29
Limitations on Allowed Feature Combinations........................................................................................42.29

Chapter 43:

Authentication Commands

Command List................................................................................................................................................................ 43.3

Chapter 44:

AAA Introduction and Configuration

AAA Introduction.......................................................................................................................................................... 44.2

Available functions and server types.............................................................................................................. 44.2
Server Groups and Method Lists ...................................................................................................................... 44.3

Configuring AAA Login Authentication ............................................................................................................... 44.5

AAA Configuration Tasks .................................................................................................................................... 44.5

Sample Authentication Configurations................................................................................................................ 44.7

Sample 802.1X Authentication Configuration............................................................................................ 44.7
Sample MAC Authentication Configuration................................................................................................ 44.8
Sample Web-Authentication Configuration................................................................................................ 44.9
Sample Tri-Authentication Configuration ..................................................................................................44.10

Chapter 45:

AAA Commands

Command List................................................................................................................................................................ 45.2