02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

AAA Au<strong>the</strong>ntication<br />

<strong>FTOS</strong> supports a distributed client/server system implemented through Au<strong>the</strong>ntication, Authorization, and<br />

Accounting (AAA) to help secure networks against unauthorized access. In <strong>the</strong> <strong>Force10</strong> implementation,<br />

<strong>the</strong> <strong>Force10</strong> system acts as a RADIUS or TACACS+ client and sends au<strong>the</strong>ntication requests to a central<br />

RADIUS or TACACS+ server that contains all user au<strong>the</strong>ntication and network service access in<strong>for</strong>mation.<br />

<strong>Force10</strong> <strong>Networks</strong> uses local (stored on <strong>the</strong> <strong>Force10</strong> system) or AAA <strong>for</strong> login au<strong>the</strong>ntication. With AAA,<br />

you can specify <strong>the</strong> security protocol or mechanism <strong>for</strong> different login methods and different users. In<br />

<strong>FTOS</strong>, AAA uses a list of au<strong>the</strong>ntication methods, called method lists, to define <strong>the</strong> types of au<strong>the</strong>ntication<br />

and <strong>the</strong> sequence in which <strong>the</strong>y are applied. You can define a method list or use <strong>the</strong> default method list.<br />

User-defined method lists take precedence over <strong>the</strong> default method list.<br />

<strong>Configuration</strong> Task List <strong>for</strong> AAA Au<strong>the</strong>ntication<br />

The following list includes <strong>the</strong> configuration tasks:<br />

• Configuring login au<strong>the</strong>ntication <strong>for</strong> terminal lines<br />

• Configuring AAA Au<strong>the</strong>ntication login methods on page 137<br />

• Enabling AAA Au<strong>the</strong>ntication on page 138<br />

• AAA Au<strong>the</strong>ntication—RADIUS on page 138<br />

For a complete listing of all commands related to login au<strong>the</strong>ntication, refer to <strong>the</strong> Security chapter in <strong>the</strong><br />

<strong>FTOS</strong> Command Reference.<br />

Configuring login au<strong>the</strong>ntication <strong>for</strong> terminal lines<br />

You can assign up to five au<strong>the</strong>ntication methods to a method list. <strong>FTOS</strong> evaluates <strong>the</strong> methods in <strong>the</strong> order<br />

in which you enter <strong>the</strong>m in each list. If <strong>the</strong> first method list does not respond or returns an error, <strong>FTOS</strong><br />

applies <strong>the</strong> next method list until <strong>the</strong> user ei<strong>the</strong>r passes or fails <strong>the</strong> au<strong>the</strong>ntication. If <strong>the</strong> user fails a method<br />

list, <strong>FTOS</strong> does not apply <strong>the</strong> next method list.<br />

136 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!