HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 51

Configuring authorization methods for an ISP domain, Configuration prerequisites, Configuration

Page 51 highlights

Step 3. Specify the default authentication method for all types of users. 4. Specify the authentication method for LAN users. 5. Specify the authentication method for login users. 6. Specify the authentication method for obtaining a temporary user role. Command Remarks authentication default { hwtacacs-scheme hwtacacs-scheme-name [ radius-scheme radius-scheme-name ] [ local ] [ none ] | ldap-scheme ldap-scheme-name [ local ] [ none ] | local [ none ] | none | radius-scheme radius-scheme-name [ hwtacacs-scheme hwtacacs-scheme-name ] [ local ] [ none ] } By default, the default authentication method is local. The none keyword is not supported in FIPS mode. authentication lan-access { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] } By default, the default authentication method is used for LAN users. The none keyword is not supported in FIPS mode. authentication login { hwtacacs-scheme hwtacacs-scheme-name [ radius-scheme radius-scheme-name ] [ local ] [ none ] | ldap-scheme ldap-scheme-name [ local ] [ none ] | local [ none ] | none | radius-scheme radius-scheme-name [ hwtacacs-scheme hwtacacs-scheme-name ] [ local ] [ none ] } By default, the default authentication method is used for login users. The none keyword is not supported in FIPS mode. authentication super { hwtacacs-scheme hwtacacs-scheme-name | radius-scheme radius-scheme-name } * By default, the default authentication method is used for obtaining a temporary user role. Configuring authorization methods for an ISP domain Configuration prerequisites Before configuring authorization methods, complete the following tasks: 1. Determine the access type or service type to be configured. With AAA, you can configure an authorization scheme for each access type and service type. 2. Determine whether to configure the default authorization method for all access types or service types. The default authorization method applies to all access users, but it has a lower priority than the authorization method that is specified for an access type or service type. Configuration guidelines When configuring authorization methods, follow these guidelines: • The device does not support LDAP authorization. • To configure RADIUS authorization, also configure RADIUS authentication, and reference the same RADIUS scheme for RADIUS authentication and authorization. If the RADIUS authorization configuration is invalid or RADIUS authorization fails, the RADIUS authentication also fails. Configuration procedure To configure authorization methods for an ISP domain: Step 1. Enter system view. Command system-view Remarks N/A 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

42
Step
Command
Remarks
3.
Specify the default
authentication method for
all types of users.
authentication default
{
hwtacacs-scheme
hwtacacs-scheme-name
[
radius-scheme
radius-scheme-name
] [
local
] [
none
] |
ldap-scheme
ldap-scheme-name
[
local
]
[
none
] |
local
[
none
] |
none
|
radius-scheme
radius-scheme-name
[
hwtacacs-scheme
hwtacacs-scheme-name
] [
local
] [
none
] }
By default, the default
authentication method is
local
.
The
none
keyword is not
supported in FIPS mode.
4.
Specify the authentication
method for LAN users.
authentication lan-access
{
local
[
none
] |
none
|
radius-scheme
radius-scheme-name
[
local
]
[
none
] }
By default, the default
authentication method is
used for LAN users.
The
none
keyword is not
supported in FIPS mode.
5.
Specify the authentication
method for login users.
authentication login
{
hwtacacs-scheme
hwtacacs-scheme-name
[
radius-scheme
radius-scheme-name
] [
local
] [
none
] |
ldap-scheme
ldap-scheme-name
[
local
]
[
none
] |
local
[
none
] |
none
|
radius-scheme
radius-scheme-name
[
hwtacacs-scheme
hwtacacs-scheme-name
] [
local
] [
none
] }
By default, the default
authentication method is
used for login users.
The
none
keyword is not
supported in FIPS mode.
6.
Specify the authentication
method for obtaining a
temporary user role.
authentication super
{
hwtacacs-scheme
hwtacacs-scheme-name
|
radius-scheme
radius-scheme-name
} *
By default, the default
authentication method is
used for obtaining a
temporary user role.
Configuring authorization methods for an ISP domain
Configuration prerequisites
Before configuring authorization methods, complete the following tasks:
1.
Determine the access type or service type to be configured. With AAA, you can configure an
authorization scheme for each access type and service type.
2.
Determine whether to configure the default authorization method for all access types or service
types. The default authorization method applies to all access users, but it has a lower priority than
the authorization method that is specified for an access type or service type.
Configuration guidelines
When configuring authorization methods, follow these guidelines:
The device does not support LDAP authorization.
To configure RADIUS authorization, also configure RADIUS authentication, and reference the same
RADIUS scheme for RADIUS authentication and authorization. If the RADIUS authorization
configuration is invalid or RADIUS authorization fails, the RADIUS authentication also fails.
Configuration procedure
To configure authorization methods for an ISP domain:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A