D-Link DI-3660 [324/506] Basic theories of aaa

D-Link DI-3660 [324/506] Basic theories of aaa
Command Line Interface Reference Manual
324
l Multiple backup systems
6.1.1.1.2 Basic Theories Of AAA
AAA is designed to dynamically configure the types of authentication and authorization based on each line (user) or
service (eg. IPIPX or VPDN). You can define the authentication and authorization types by creating method lists and
then apply these lists on a specific service or port.
 
6.1.1.1.3 List Of Methods
The list of authentication methods defines multiple methods used to authenticate a user. The administrator can configure
one or more protocols used for authentication in the method list, therefore, to ensure that you can have a backup
authentication method in case the former method fails. Firstly, list one method, if it doesnt work out any response,
please select the second method on the methods list; This process will continue until the listed method successfully carries
out an authentication or use up the resource of authentication method list, in this case, the authentication turns out to be
fail.
Note: The later methods to attempt authentication are only used when the former ones dont work. As long as
any part of ths authetication process fails in other words, the response from the security server or local user
names database is to reject the user to access the authentication process ends, andthere will be no more attempt
to proceed.
Figure 1 shows a typical AAA network configuration that includes four security servers: R1and R2 are RADIUS servers
and T1 and T2 are TACACS+ servers.
Figure 1
Suppose the system administrator has determined that all ports authenticate the PPP based connection with the same
authentication method in the security scheme: Firstly, connect R1 to learn the ralating authentication information, if R1
doesnt respond, then connect R2, if R2 doesnt respond, then T1, then T2. If all designated server dont respond, the
authentication will be focused on the local user name database of the access server itself. When a remote user is
attempting to access the network by dial-up, the network server will demand the relative authentication info on R1, if the
user is authenticated to be legal, it will send a PASS reply to network access server, to enable the user to access the server;
If R1 answers FAIL message, the user will be turned down, the session terminated. If theres no response from R1, the
network server will view it as a ERROR and try to find the authentication info on R2. This model will last in the rest of
the time until the user is accepted or rejected, or the termination of this session.
Note: Please remember that a FAIL response completely differs from an ERROR response. FAIL indicates that the
user has not met the criteria of a sucessful authentication that contained in the authentication database, and the
authentication ends up with a FAIL response. ERROR means that the security server has not responded to an
authentication query. Only if AAA detected ERROR will it choose the next authentication method defined in the
authentication methods list.

Содержание

Скачать