Authentication

The Users tab allows users logged in as administrators to add new users or edit existing users and their privilege levels. Depending on the selected role, the user has the following rights:

  • administrator: full control, limitless administration and system update;
  • user: create and set rules, aggregate and filter traffic, and port configuration;
  • viewer: view only: settings, statistics, active rules.

The minimum requirements for the passwords are as follows:

  • 8 characters;
  • one letter uppercase;
  • one letter lowercase;
  • one digit.

The Allow External Authentication option allows the user's credentials to be used to log into devices on which Shared Authentication was enabled (see Centralized Authentication).

The TACACS+ tab allows adding one or more TACACS+ servers, and configuring the following details:

  • priority (sets the order in which the servers will be taken into account, if more are added, with a lower number corresponding to a higher priority);
  • login type (chap, login, pap);
  • server hostname;
  • port;
  • secret key;
  • timeout (waiting time for response from the TACACS+ server, can be set between 1 and 3 seconds);
  • privilege mapping (translates the 15 privilege levels from TACACS+ into those of the viewers, users and admins; can be configured).

The Allow External Authentication option allows the user credentials defined on the TACACS+ server to be used to log into devices on which Shared Authentication was enabled (see Centralized Authentication).

The RADIUS tab allows adding one or more RADIUS servers, and configuring the following details:

  • priority (sets the order in which the servers will be taken into account, if more are added, with a lower number corresponding to a higher priority);
  • server hostname;
  • port;
  • secret key;
  • timeout (waiting time for response from the RADIUS server, can be set between 1 and 3 seconds);
  • privilege mappings count (allows adding one or more rules for users. These rules are integer or string type attributes, requiring a name and a value. During authentication, the system checks if a user matches the rules. If there is a match between a user and a rule, then a role is applied for the user);
    Note: To add a new rule, click the add button. To apply the rule, click the apply button.
  • fallback role (comes into place when there isn’t a match between a user and a rule, with the ‘none’ option denying authentication access to any user).

The Allow External Authentication option allows the user credentials defined on the RADIUS server to be used to log into devices on which Shared Authentication was enabled (see Centralized Authentication).

Supervisor allows users to not only define multiple authentication methods, but also to configure how the different methods are used by the system. Clicking the Configure Authentication button on either the Users, TACACS+, or RADIUS page allows users to see the list of available authentication methods and change their priority and activation strategy.

For each method, one of the following strategies can be selected:

  • Enable: The method is activated and will be used to authenticate users;
  • Disable: The method is not active and its configuration will be ignored;
  • Restrict: A restricted authentication method is activated only if all higher priority methods are failing access. In the case of RADIUS or TACACS+ methods, this means that no server is responding (or no server is programmed). If only one of the registered RADIUS/TACACS+ servers replies with a rejection, the following restricted methods will be skipped. Note that “Local Users” are always available, meaning that any “restrict” method after that will never be activated.

Supervisor provides the ability to use credentials defined in the Supervisor itself in order to log into devices it manages. Devices on which Shared Authentication was enabled will be able to use Supervisor credentials, be they Local Users, or users defined on TACACS+ or RADIUS servers, on which Allow External Authentication was enabled. The Centralized Authentication follows the Supervisor's Custom Authentication Configuration.

  • Last modified: April 3, 2024