Users Guide

Table Of Contents
Contents 13
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 276
Configuring Stack Member, Stack Port, SFS and
NSF Settings
. . . . . . . . . . . . . . . . . . . . 276
Viewing and Clearing Stacking and NSF Information
278
Connecting to the Management Console from a
Stack Member
. . . . . . . . . . . . . . . . . . . 279
Stacking and NSF Usage Scenarios
. . . . . . . . . . . 279
Basic Failover
. . . . . . . . . . . . . . . . . . . . 279
Preconfiguring a Stack Member
. . . . . . . . . . 281
NSF in the Data Center
. . . . . . . . . . . . . . . 283
NSF and VoIP
. . . . . . . . . . . . . . . . . . . . 284
NSF and DHCP Snooping
. . . . . . . . . . . . . . 285
NSF and the Storage Access Network
. . . . . . . 286
NSF and Routed Access
. . . . . . . . . . . . . . 288
9 Authentication, Authorization, and Accounting
291
AAA Introduction . . . . . . . . . . . . . . . . . . . . 291
Methods
. . . . . . . . . . . . . . . . . . . . . . 292
Method Lists
. . . . . . . . . . . . . . . . . . . . 293
Access Lines
. . . . . . . . . . . . . . . . . . . . 294
Enabling SSH Access
. . . . . . . . . . . . . . . . 295
Access Lines (AAA)
. . . . . . . . . . . . . . . . 295
Access Lines (Non-AAA)
. . . . . . . . . . . . . . 296
Authentication
. . . . . . . . . . . . . . . . . . . . . . 297
Authentication Access Types
. . . . . . . . . . . 297
Authentication Manager
. . . . . . . . . . . . . . 298
Using RADIUS
. . . . . . . . . . . . . . . . . . . 307
Using TACACS+
. . . . . . . . . . . . . . . . . . 312
Dynamic ACL Overview
. . . . . . . . . . . . . . . 314
Authentication Examples
. . . . . . . . . . . . . . 321