3com 4210 PWR 9-Port 3CR17341-91-ME ユーザーズマニュアル
![3com](https://files.manualsbrain.com/attachments/960452ff43b9899cbcffced60c87abf956e7967a/common/fit/150/50/f6ac125d7af2cf40fec58935fa6d4bf71457a57efe50bee91208a434f325/brand_logo.jpeg)
製品コード
3CR17341-91-ME
20
AAA O
VERVIEW
Introduction to AAA
AAA is the acronym for the three security functions: authentication, authorization
and accounting. It provides a uniform framework for you to configure these three
functions to implement network security management.
and accounting. It provides a uniform framework for you to configure these three
functions to implement network security management.
■
Authentication: Defines what users can access the network,
■
Authorization: Defines what services can be available to the users who can
access the network, and
access the network, and
■
Accounting: Defines how to charge the users who are using network
resources.
resources.
Typically, AAA operates in the client/server model: the client runs on the managed
resources side while the server stores the user information. Thus, AAA is well
scalable and can easily implement centralized management of user information.
resources side while the server stores the user information. Thus, AAA is well
scalable and can easily implement centralized management of user information.
Authentication
AAA supports the following authentication methods:
■
None authentication: Users are trusted and are not checked for their validity.
Generally, this method is not recommended.
Generally, this method is not recommended.
■
Local authentication: User information (including user name, password, and
some other attributes) is configured on this device, and users are authenticated
on this device instead of on a remote device. Local authentication is fast and
requires lower operational cost, but has the deficiency that information storage
capacity is limited by device hardware.
some other attributes) is configured on this device, and users are authenticated
on this device instead of on a remote device. Local authentication is fast and
requires lower operational cost, but has the deficiency that information storage
capacity is limited by device hardware.
■
Remote authentication: Users are authenticated remotely through the RADIUS
protocol. This device (for example, a 3Com series switch) acts as the client to
communicate with the RADIUS server. You can use standard or extended
RADIUS protocols in conjunction with such systems as iTELLIN/CAMS for user
authentication. Remote authentication allows convenient centralized
management and is feature-rich. However, to implement remote
authentication, a server is needed and must be configured properly.
protocol. This device (for example, a 3Com series switch) acts as the client to
communicate with the RADIUS server. You can use standard or extended
RADIUS protocols in conjunction with such systems as iTELLIN/CAMS for user
authentication. Remote authentication allows convenient centralized
management and is feature-rich. However, to implement remote
authentication, a server is needed and must be configured properly.
Authorization
AAA supports the following authorization methods:
■
Direct authorization: Users are trusted and directly authorized.
■
Local authorization: Users are authorized according to the related attributes
configured for their local accounts on this device.
configured for their local accounts on this device.
■
RADIUS authorization: Users are authorized after they pass RADIUS
authentication. In RADIUS protocol, authentication and authorization are
combined together, and authorization cannot be performed alone without
authentication.
authentication. In RADIUS protocol, authentication and authorization are
combined together, and authorization cannot be performed alone without
authentication.