Administrator Guide

14 Contents
Access Lines . . . . . . . . . . . . . . . . . . . . 272
Enabling SSH Access
. . . . . . . . . . . . . . . . 273
Access Lines (AAA)
. . . . . . . . . . . . . . . . . 274
Access Lines (Non-AAA)
. . . . . . . . . . . . . . 274
Authentication
. . . . . . . . . . . . . . . . . . . . . . 275
Authentication Types
. . . . . . . . . . . . . . . . 275
Authentication Manager
. . . . . . . . . . . . . . 276
Using RADIUS
. . . . . . . . . . . . . . . . . . . . 282
Using TACACS+ Servers to Control Management
Access . . . . . . . . . . . . . . . . . . . . . . . 287
Authentication Examples
. . . . . . . . . . . . . . 289
Public Key SSH Authentication Example
. . . . . . 297
Associating a User With an SSH Key
. . . . . . . . 305
Authorization
. . . . . . . . . . . . . . . . . . . . . . . 307
Exec Authorization Capabilities
. . . . . . . . . . . 307
Authorization Examples
. . . . . . . . . . . . . . . 309
RADIUS Change of Authorization
. . . . . . . . . . 311
TACACS Authorization
. . . . . . . . . . . . . . . 315
Accounting
. . . . . . . . . . . . . . . . . . . . . . . . 319
RADIUS Accounting
. . . . . . . . . . . . . . . . 319
IEEE 802.1X
. . . . . . . . . . . . . . . . . . . . . . . . 321
What is IEEE 802.1X?
. . . . . . . . . . . . . . . . 321
What are the 802.1X Port Authentication
Modes?
. . . . . . . . . . . . . . . . . . . . . . . 322
What is MAC-Based 802.1X Authentication?
. . . . 323
What is the Role of 802.1X in VLAN
Assignment?
. . . . . . . . . . . . . . . . . . . . 325
What is Monitor Mode?
. . . . . . . . . . . . . . . 328
How Does the Authentication Server Assign
DiffServ Policy?
. . . . . . . . . . . . . . . . . . . 330
What is the Internal Authentication Server?
. . . . 330