H3C Technologies H3C WX3000 Series Unified Switches User Manual
Page 14
ix
RADIUS Configuration Task List...........................................................................................................25-8
Creating a RADIUS Scheme .........................................................................................................25-9
Configuring RADIUS Authentication/Authorization Servers ........................................................25-10
Configuring RADIUS Accounting Servers ...................................................................................25-10
Configuring Shared Keys for RADIUS Messages .......................................................................25-12
Configuring the Maximum Number of RADIUS Request Transmission Attempts.......................25-12
Configuring the Type of RADIUS Servers to be Supported ........................................................25-13
Configuring the Status of RADIUS Servers.................................................................................25-13
Configuring the Attributes of Data to be Sent to RADIUS Servers .............................................25-14
Configuring the Local RADIUS Authentication Server Function .................................................25-15
Configuring Timers for RADIUS Servers.....................................................................................25-16
Enabling Sending Trap Message when a RADIUS Server Goes Down .....................................25-16
Enabling the User Re-Authentication at Restart Function...........................................................25-17
HWTACACS Configuration Task List..................................................................................................25-18
Creating a HWTACACS Scheme ................................................................................................25-18
Configuring TACACS Authentication Servers .............................................................................25-19
Configuring TACACS Authorization Servers...............................................................................25-19
Configuring TACACS Accounting Servers ..................................................................................25-20
Configuring Shared Keys for HWTACACS Messages ................................................................25-21
Configuring the Attributes of Data to be Sent to TACACS Servers ............................................25-21
Configuring the Timers Regarding TACACS Servers .................................................................25-22
Displaying and Maintaining AAA.........................................................................................................25-23
AAA Configuration Examples..............................................................................................................25-24
Remote RADIUS Authentication of Telnet/SSH Users ...............................................................25-24
Local Authentication of FTP/Telnet Users...................................................................................25-25
HWTACACS Authentication and Authorization of Telnet Users .................................................25-26
Troubleshooting AAA ..........................................................................................................................25-27
Troubleshooting RADIUS Configuration......................................................................................25-27
Troubleshooting HWTACACS Configuration ..............................................................................25-28
28 EAD Configuration.................................................................................................................................25-1
Introduction to EAD ...............................................................................................................................25-1
Typical Network Application of EAD .....................................................................................................25-1
EAD Configuration ................................................................................................................................25-2
EAD Configuration Example .................................................................................................................25-2
29 MAC Authentication Configuration......................................................................................................29-1
MAC Authentication Overview ..............................................................................................................29-1
Related Concepts..................................................................................................................................29-2
MAC Authentication Timers...........................................................................................................29-2
Quiet MAC Address.......................................................................................................................29-2
Configuring Basic MAC Authentication Functions ................................................................................29-2
MAC Address Authentication Enhanced Function Configuration .........................................................29-3