
Software Reference for x310 Series Switches
C613-50046-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.4C xiii
Chapter 42: Authentication Introduction and Configuration
Authentication Introduction .................................................................................................................................... 42.2
Configuring a Guest VLAN..................................................................................................................................42.2
802.1X-Authentication ...............................................................................................................................................42.3
Web-Authentication....................................................................................................................................................42.4
What is Web-Authentication? ...........................................................................................................................42.4
Web-Authentication Basics................................................................................................................................ 42.4
Configuring Web-Authentication....................................................................................................................42.6
Starting a Web-Authentication Session ........................................................................................................42.8
Support for Protocols Underlying Web-Authentication .......................................................................42.10
Web-Authentication Timeout Connect.......................................................................................................42.14
Web Authorization Proxy..................................................................................................................................42.15
MAC-Authentication..................................................................................................................................................42.16
Why is MAC-Authentication Required? .......................................................................................................42.16
How Does MAC-Authentication Work? .......................................................................................................42.16
Configuring MAC-Authentication .................................................................................................................42.17
Tri-Authentication ......................................................................................................................................................42.18
Tri-Authentication Configuration.........................................................................................................................42.19
Two-step Authentication.........................................................................................................................................42.21
Ensuring Authentication Methods Require Different Usernames and Passwords .............................42.22
Roaming Authentication .........................................................................................................................................42.23
Roaming Authentication Overview ..............................................................................................................42.24
Roaming Authentication Feature Interactions .........................................................................................42.25
Unauthenticated Supplicant Traffic.....................................................................................................................42.26
Deciding When a Supplicant Fails Authentication..................................................................................42.28
Failed Authentication VLAN ............................................................................................................................42.29
Limitations on Allowed Feature Combinations........................................................................................42.29
Chapter 43: Authentication Commands
Command List................................................................................................................................................................ 43.3
Chapter 44: AAA Introduction and Configuration
AAA Introduction.......................................................................................................................................................... 44.2
Available functions and server types..............................................................................................................44.2
Server Groups and Method Lists......................................................................................................................44.3
Configuring AAA Login Authentication ............................................................................................................... 44.5
AAA Configuration Tasks ....................................................................................................................................44.5
Sample Authentication Configurations................................................................................................................44.7
Sample 802.1X Authentication Configuration............................................................................................44.7
Sample MAC Authentication Configuration................................................................................................ 44.8
Sample Web-Authentication Configuration................................................................................................ 44.9
Sample Tri-Authentication Configuration ..................................................................................................44.10
Chapter 45: AAA Commands
Command List................................................................................................................................................................ 45.2
Komentáře k této Příručce