No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Summary of AAA Configuration Tasks

Summary of AAA Configuration Tasks

After AAA configuration is complete, the device authenticates users and authorizes users. In addition, the device also records the network resource usage of users.

In theory, the device supports the combination of local, Remote Authentication Dial In User Service (RADIUS), and Huawei Terminal Access Controller Access Control System (HWTACACS) authentication, authorization, and accounting. For example, the device provides local authentication, local authorization, and RADIUS accounting.

In practice, the scheme in Table 1-15 are often used separately. Multiple authentication or authorization modes can be used in a scheme. For example, local authentication is used as a backup of RADIUS authentication and HWTACACS authentication, and local authorization is used as a backup of HWTACACS authorization.

Table 1-15 AAA configuration tasks

Configuration Task



Local authentication and authorization

If users need to be authenticated or authorized but no RADIUS server or HWTACACS server is deployed on the network, use local authentication and authorization. Local authentication and authorization feature fast processing and low operation cost; however, the amount of local authentication and authorization information that can be stored is subject to the device hardware capacity.

Local authentication and authorization are often used for administrators.

Configuring Local Authentication and Authorization

RADIUS authentication, authorization, and accounting

RADIUS protects a network from unauthorized access, and is often used on the networks demanding high security and control of remote user access.

Configuring RADIUS AAA

HWTACACS authentication, authorization, and accounting

HWTACACS protects a network from unauthorized access and supports command-line authorization. HWTACACS is more reliable in transmission and encryption than RADIUS, and is more suitable for security control.

Configuring HWTACACS AAA

Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 22767

Downloads: 93

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next