28.05.2013 Views

TigerSwitch 10/100/1000 - SMC

TigerSwitch 10/100/1000 - SMC

TigerSwitch 10/100/1000 - SMC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CONFIGURING THE SWITCH<br />

Configuring Radius Logon Authentication<br />

2-14<br />

Remote Authentication Dial-in User Service (RADIUS) is an<br />

authentication protocol that uses a central server to control access to<br />

RADIUS-compliant devices on the network. A RADIUS server can be<br />

programmed with a database of multiple user name/password pairs and<br />

associated privilege levels for each user or group that requires management<br />

access to this switch using the console port, Telnet or the Web.<br />

When setting up privilege levels on the RADIUS server, level 0 allows<br />

guest (CLI - Normal Exec) access to the switch. Only level 15 allows<br />

administrator (CLI - Privileged Exec) access.<br />

Command Attributes<br />

• Authentication – Select the authentication, or authentication<br />

sequence required:<br />

- Radius – User authentication is performed using a RADIUS server<br />

only.<br />

- Local – User authentication is performed only locally by the switch.<br />

- Radius, Local – User authentication is attempted first using a<br />

RADIUS server, then locally by the switch.<br />

- Local, Radius – User authentication is first attempted locally by the<br />

switch, then using a RADIUS server.<br />

• Server IP Address – The IP address of the RADIUS server.<br />

• Server Port Number – The UDP port number used by the RADIUS<br />

server.<br />

• Secret Text String – The text string that is shared between the switch<br />

and the RADIUS server.<br />

• Number of Server Transmits – The number of request transmits to<br />

the RADIUS server before failure.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!