Troubleshooting AAA&RADIUS Configuration
189
Network requirements
In the network environment shown in Figure 59, you are required to configure the
switch so that the Telnet users logging into the switch are authenticated locally.
Network diagram
Figure 59
Local authentication of Telnet users
Configuration procedure
1
Method 1: Using a local authentication scheme
a
Enter system view.
<S4200G>
system-view
System View: return to User View with Ctrl+Z.
[4200G]
b
Adopt AAA authentication for Telnet users.
[4200G]
user-interface vty 0 4
[4200G-ui-vty0-4]
authentication-mode scheme
c
Create and configure a local user named telnet.
[4200G]
local-user telnet
[4200G-luser-telnet]
service-type telnet
[4200G-luser-telnet]
password simple 3Com
[4200G-luser-telnet]
attribute idle-cut 300 access-limit 5
[4200G]
domain system
[4200G-isp-system]
scheme local
A Telnet user logging into the switch with the name telnet@system belongs to the
system domain and will be authenticated according to the configuration of the
system domain.
2
Method 2: using a local RADIUS server
This method is similar to the remote authentication method described in “Remote
RADIUS Authentication of Telnet/SSH Users”. You only need to change the server IP
address, the authentication password, and the UDP port number for authentication
service in configuration step “Configure a RADIUS scheme” in “Remote RADIUS
Authentication of Telnet/SSH Users”to 127.0.0.1, 3Com, and 1645 respectively, and
configure local users.
Troubleshooting
AAA&RADIUS
Configuration
The RADIUS protocol is at the application layer in the TCP/IP protocol suite. This
protocol prescribes how the switch and the RADIUS server of the ISP exchange user
information with each other.
Symptom 1
: User authentication/authorization always fails.
Internet
Telnet user
Internet
Internet
Internet
Telnet user
Internet
Internet
Summary of Contents for 4200G 12-Port
Page 10: ...8 CONTENTS...
Page 14: ...4 ABOUT THIS GUIDE...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS...