beautypg.com

Overview of device authentication process, User level security, Configuring user level security – Enterasys Networks CSX6000 User Manual

Page 168: User level security background information, Overview of device authentication process 168, User level security 168

background image

USER’S GUIDE

168 CyberSWITCH

O

VERVIEW

OF

D

EVICE

A

UTHENTICATION

P

ROCESS

When a remote device connects, the CyberSWITCH negotiates the required authentication. It then
collects the information which is used to identify and authenticate the remote device. The system
compares this collected information against information maintained in a device database. If the
information collected from the remote device matches the information found in the database, the
connection is valid and the device is allowed access to network resources. If the collected
information does not match the information in the database, the connection is disconnected.

The device database can be maintained either locally on the CyberSWITCH itself, or on a server,
central to the network. When an on-node device database is used, device information is configured
either directly through the CFGEDIT configuration utility or through using Manage Mode
commands.

It is also possible to configure and maintain device information on an off-node, central device
database. This could be useful for networks with a large number of devices or several systems. Only
one device database would need to be configured and maintained. The Remote Authentication Dial
In User Service (RADIUS) and CSM are the off-node, central databases currently supported by the
system. The RADIUS Server option is available for PPP/IP devices (with CHAP or PAP security),
HDLC bridge devices, and RFC 1294 devices.

U

SER

L

EVEL

S

ECURITY

C

ONFIGURING

U

SER

L

EVEL

S

ECURITY

U

SING

CFGEDIT

1.

Select User Level Security from the Security Level Menu. If you need guidance to find this menu,
refer to the instructions provided in the

No Security

configuration section.

2.

Refer to the chapter

Configuring User Level Databases

in order to select and configure the user

level database.

U

SING

M

ANAGE

M

ODE

seclevel

Displays the current security level configuration data.

U

SER

L

EVEL

S

ECURITY

B

ACKGROUND

I

NFORMATION

User level security is an authentication process between a specific user and a device. The
authentication process is interactive; users connect to a terminal server and need to interact with it
in order to communicate with other devices beyond the server. The CyberSWITCH supports user
level security through the RADIUS, TACACS, or ACE server.

User level security supports the following devices:

PPP devices

HDLC bridges

This manual is related to the following products: