No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


CLI-based Configuration Guide - Security

AR100, AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R010

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the network management feature supported by the device.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Summary of AAA Configuration Tasks

Summary of AAA Configuration Tasks

In theory, the device supports the combination of authentication, authorization, and accounting. For example, the device can provide local authentication, local authorization, and RADIUS accounting.

In practice, the schemes in Table 1-32 are often used separately. Multiple authentication or authorization modes can be used in a scheme. For example, local authentication is used as a backup of RADIUS authentication and HWTACACS authentication, and local authorization is used as a backup of HWTACACS authorization.

Table 1-32  AAA configuration tasks

Configuration Task



Local authentication and authorization

If users need to be authenticated or authorized but no RADIUS server or HWTACACS server is deployed on the network, use local authentication and authorization. Local authentication and authorization feature fast processing and low operation costs; however, the amount of local authentication and authorization information that can be stored is subject to the device hardware capacity.

Local authentication and authorization are often used for administrators.

Configuring Local Authentication and Authorization

RADIUS authentication, authorization, and accounting

RADIUS protects a network from unauthorized access, and is often used on networks demanding high security and control of remote user access.

Using RADIUS to Perform Authentication, Authorization, and Accounting

HWTACACS authentication, authorization, and accounting

HWTACACS protects a network from unauthorized access and supports command-line authorization. HWTACACS is more reliable in transmission and encryption than RADIUS, and is more suitable for security control.

Using HWTACACS to Perform Authentication, Authorization, and Accounting

HACA authentication, authorization, and accounting

HACA is usually used in cloud management scenarios. HACA is based on HTTP/2 and only supports MAC address-prioritized authentication.

Configuring HACA Authentication

Updated: 2019-08-07

Document ID: EDOC1100034077

Views: 125896

Downloads: 230

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next