22.10.2013 Views

7.8.1.0 - Force10 Networks

7.8.1.0 - Force10 Networks

7.8.1.0 - Force10 Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

AAA Authentication<br />

FTOS supports a distributed client/server system implemented through Authentication, Authorization, and<br />

Accounting (AAA) to help secure networks against unauthorized access. In the <strong>Force10</strong> implementation,<br />

the <strong>Force10</strong> system acts as a RADIUS or TACACS+ client and sends authentication requests to a central<br />

RADIUS or TACACS+ server that contains all user authentication and network service access information.<br />

<strong>Force10</strong> <strong>Networks</strong> uses local usernames/passwords (stored on the <strong>Force10</strong> system) or AAA for login<br />

authentication. With AAA, you can specify the security protocol or mechanism for different login methods<br />

and different users. In FTOS, AAA uses a list of authentication methods, called method lists, to define the<br />

types of authentication and the sequence in which they are applied. You can define a method list or use the<br />

default method list. User-defined method lists take precedence over the default method list.<br />

Configuration Task List for AAA Authentication<br />

The following sections provide the configuration tasks:<br />

• Configure login authentication for terminal lines<br />

• Configure AAA Authentication login methods on page 679<br />

• Enable AAA Authentication on page 680<br />

• AAA Authentication—RADIUS on page 680<br />

For a complete listing of all commands related to login authentication, refer to the Security chapter in the<br />

FTOS Command Reference.<br />

Configure login authentication for terminal lines<br />

You can assign up to five authentication methods to a method list. FTOS evaluates the methods in the order<br />

in which you enter them in each list. If the first method list does not respond or returns an error, FTOS<br />

applies the next method list until the user either passes or fails the authentication. If the user fails a method<br />

list, FTOS does not apply the next method list.<br />

678 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!