Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
Nortel is a recognized leader in delivering communications capabilities that enhance the human
experience, ignite and power global commerce, and secure and protect the world’s most critical
information. Serving both service provider and enterprise customers, Nortel delivers innovative
technology solutions encompassing end-to-end broadband, Voice over IP, multimedia services
and applications, and wireless broadband designed to help people solve the world’s greatest
challenges. Nortel does business in more than 150 countries. For more information, visit Nortel
on the Web at www.nortel.com
otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS"
WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The
information and/or products described in this document are subject to change without
notice. Nortel Networks, the Nortel Networks logo and the Globemark are trademarks of
Nortel Networks.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
1. Overview: RADIUS User Authentication
using Identify Engines
This document provides the framework for implementing user Authentication, Authorization, and
Accounting for Nortel switches.
1.1 RADIUS Support on Nortel Switches
ERS 8600 Yes Yes Yes Yes Yes Yes Yes
ERS 8300 Yes Yes Yes Yes Yes Yes No
ERS 1600 Yes Yes Yes Yes Yes Yes No
ES 460/470 Yes Yes No No No No No
ERS 2500 Yes Yes No Yes No No No
ERS 4500 Yes Yes No Yes No No No
ERS 5500 Yes Yes No Yes No No No
ERS 5600 Yes Yes No Yes No No No
RADIUS
authentication
802.1x
(EAP)
RADIUS
authentication
RADIUS
accounting
802.1x
(EAP)
RADIUS
accounting
RADIUS
accounting for CLI
commands
RADIUS
user
access
profile
RADIUS
SNMP
accounting
1.2 User Authentication using ERS1600, ERS8300, or
ERS8600
The ERS1600, ERS8300, and ERS8600 each support six different user access levels. The
access level is determined by the RADIUS attribute value sent back to the switch. The switch
uses RADIUS Vendor-Specific Attributes (IETF Attribute 26) to support its own extended
attributes. Vendor identifier 1584 (Bay Networks) attribute type 192 is used where the value is a
number from 0 to 6. The following chart displays the RADIUS attribute values and corresponding
access level.
Access Level VSA Attribute 26 – Vendor Identifier 1584
In addition, on the ERS8600 only, via vendor identifier 1584 attribute type 194, if is set to a value
of 0, you can enter a list of CLI commands not allowed for a user. The CLI command is entered
using the RADIUS string value configured via RADIUS vendor identifier 1584 attribute type 195.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
1.3 User Authentication using ERS5600, ERS5500,
ERS4500, or ERS2500
The ERS5600, ERS5500, ERS4500, and ERS2500 each support two different user acce ss levels
which are read-only or read-write. RADIUS attribute type 6, Service-Type, is used to determine
the access level. The following displays the complete list of RADIUS attribute values for the
RADIUS Service-Type attribute where value 6 (Administrative) is used for read-write access and
value 7 (NAS Prompt) is used for read-only access
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2. ERS8600 Switch Configuration Example
For this configuration example, we will enable RADIUS user authentication on ERS8600-1 using
the out-of-band management port. We will configure the Identity Engines RADIUS server with the
following three users:
• User name with read-only access: 8600ro
• User name with read-write access: 8600rw
• User name with read-write-all access: 8600rwa
For this example, we will break down the configuration into two parts. In part one, we will simply
add AAA services for the three users shown above. Part two is a continuation of part one with the
addition of showing how to restrict certain CLI commands. In part two, we will pick the read-write
user and deny access to QoS and filter configuration for this user.
When configuring the RADIUS server on the ERS8600, you can configure the switch
with a RADIUS source-IP address which in turn will be the IP address used for RADIUS
requests. The RADIUS source-IP address must be a circuit-less IP address (CLIP) or
otherwise known as a loopback address. If you do not enable a RADIUS source-IP
address, by default, the ERS8600 uses the IP address of the outgoing interface as the
source IP address for RADIUS. Unfortunately, although you can create and enable a
RADIUS source-IP when using the out-of-band management port, this feature is not
supported on the out-of-band management port. Hence, if you have two CP cards, you
will have to configure two RADIUS Authenticators on the RADIUS server.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.1.3 IDE Setup
2.1.3.1 Configure an Outbound Attribute on Ignition Server for VLAN
The following chart displays the outbound attribute values required by the ERS8600 for each
access level for RADIUS vendor identifier 1584 (Bay Networks) attribute type 192. For this
example, we will configure IDE with attribute values of 1, 5, and 6.
IDE Step 1 – IDE already has the vendor specific attributes defined (Bay Networks vendor
code 1584 using attribute type 192) for the ERS8600 which can be viewed by going to Site Configuration -> Provisioning -> Vendors/VSAs -> Bay-Networks -> VSA Definitions.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 2 – Go to Site Configuration -> Provisioning -> Outbound Attributes -> New
IDE Step 3 – Via the Outbound Attribute window, type in a name for the attribute to be used
for access priority (i.e. ERS8600-Access-Priority as used in this example), click the VSA
radio button, select Bay-Networks via Vendor and ERS8xxx-Access-Priority via VSA. Click
on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 4 – Go to Site Configuration -> Provisioning -> Outbound Values -> New
IDE Step 5 – Using the Outbound Attribute created in Step 3, we will first add an attribute
value of 1 for read-only-access. Start by entering a name via the Outbound Value Name:
window (i.e. 8600-ro as used in this example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 6 – Select the Outbound Attributes name created in Step 3 (i.e. ERS8600-AccessPriority as used in this example) via the Choose Global Outbound Attribute: pull down
menu. In the Value Unsigned – 32 bit window, enter 1 (i.e. value of 1 signifies read-onlyaccess). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 7 – Go to Site Configuration -> Provisioning -> Outbound Values -> New again to
create the outbound attribute for read-write-access. Using the Outbound Attribute created
in Step 3, we will add an attribute value of 5 for read-write-access. Start by entering a name
via the Outbound Value Name: window (i.e. 8600-rw as used in this example) and click on
New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 8 –Select the Outbound Attributes name created in Step 3 (i.e. ERS8600-AccessPriority as used in this example) via the Choose Global Outbound Attribute: pull down
menu. In the Value Unsigned – 32 bit window, enter 5 (i.e. value of 5 signifies read-writeaccess). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 9 – Go to Site Configuration -> Provisioning -> Outbound Values -> New again to
create the outbound attribute for read-write-all-access. Using the Outbound Attribute
created in Step 3, we will add an attribute value of 6 for read-write-all-access. Start by
entering a name via the Outbound Value Name: window (i.e. 8600-rwa as used in this
example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 10 –Select the Outbound Attributes name created in Step 3 (i.e. ERS8600-AccessPriority as used in this example) via the Choose Global Outbound Attribute: pull down
menu. In the Value Unsigned – 32 bit window, enter 6 (i.e. value of 6 signifies read-write-all-
access). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 2 – Enter the user name for read-only-access via User Name: (i.e. 8600ro as used
in this example) and enter the password for this user via Password and Confirm Password.
Click on OK when done. If you wish, you can also change the expiry date via Password Expires if you do not wish to use the default setting of one year
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 3 – Repeat step 2 again by clicking on New to add the read-write-access user.
Enter the user name for read-write-access via User Name: (i.e. 8600rw as used in this
example) and enter the password for this user via Password and Confirm Password. Click
on OK when done. If you wish, you can also change the expiry date via Password Expires
if you do not wish to use the default setting of one year
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 4 – Repeat step 2 for the final time by clicking on New to add the read-write-allaccess user. Enter the user name for read-write-all-access via User Name: (i.e. 8600rwa as
used in this example) and enter the password for this user via Password and Confirm
Password. Click on OK when done. If you wish, you can also change the expiry date via
Password Expires if you do not wish to use the default setting of one year
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.1.3.3 Add an Access Policy
IDE Step 1 – Go to Site Configuration -> Access Policies -> RADIUS. Right-click RADIUS
and select New Access Policy. Enter a policy name (i.e. ERS8600-Access as used in this
example) and click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 7 – Once the Edit Authorization Policy window pops up, click on Add. First, we
will add a rule for read-only-access. When the New Rule window pops up, w e w ill na me t he
rule read-only-access as shown below
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 9 – For this example, we are simply going to look for the read-only-user user-id.
From Attribute Category, select User and scroll down and select user-id. Select Equal To
with Format of None and enter the read-only-access user id, i.e. 8600ro as used in this
example, in the Static Value window as shown below. Click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 10 – Via Actions, select Allow. From the All Outbound Values window, select the
output attribute we created previously named 8600ro and click on the less-than arrow key
to move the attribute to the Provision With window
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 11 – Next, we will add a rule for read-write-access. Start by clicking on Add and
when the New Rule window pops up, add an appropriate name for this rule, i.e. read-writeaccess as used in this example
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 13 – For this example, we are simply going to look for the read-write-access userid. From Attribute Category, select User and scroll down and select user-id. Select Equal To with Format of None and enter the read-only-access user id, i.e. 8600rw as used in this
example, in the Static Value window as shown below. Click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 14 – Via Action, select Allow. From the All Outbound Values window, select the
output attribute we created previously named 8600rw and click on the less-than arrow key
to move the attribute to the Provision With window
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 15 – Finally, we will add a rule for read-write-all-access. Start by clicking on Add
and when the New Rule window pops up, add an appropriate name for this rule, i.e. read-write-all-access as used in this example
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 17 – For this example, we are simply going to look for the read-write-all-access
user-id. From Attribute Category, select User and scroll down and select user-id. Select
Equal To with Format of None and enter the read-only-access user id, i.e. 8600rwa as used
in this example, in the Static Value window as shown below. Click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 18 – Via Action, select Allow. From the All Outbound Values window, select the
output attribute we created above named 8600rwa and click on the less-than arrow key to
move the attribute to the Provision With win dow
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.1.3.4 Add the Nortel ERS8600-1 switch as an RADIUS Authenticator
For Ignition Server to process the Nortel switch RADIUS requests, each switch must be added as
an Authenticator.
IDE Step 1 – Go to Site Configuration -> Authenticators -> default. For this example, we will
create new container named Nortel Switch by right clicking default and selecting Add Container
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 3 – Enter the settings as shown below making sure you select the policy we
created previously named ERS8600-Access via Access Policy. Leave Enable Authenticator
and Enable RADIUS Access checked. Click on OK when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.1.4 Verification
2.1.4.1 Verify User Authentication
You can test user authentication for the ERS8600 users configured on IDE by entering the user
name and password.
Step 1 – Via Ignition Dashboard, select the IP address of the Ignition Server, click on the
Troubleshoot tab, go to Directory Service Debugger and select the Auth User tab. Make you select
Internal User Store and PAP and the enter a valid user name and password configured for the ERS8600 and click on Send Request. For more details, repeat the same steps but via the Process
Request tab instead
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
Via Dashboard, verify the following information:
Option Verify
Results If successful, Authentication successful should be displayed
2.1.4.2 Verify user authentication from ERS switch
You can view the authentication details via Ignition Dashboard which provides extensive details
about the device or user.
Step 1 – In Dashboard, select the IP address of the Ignition Server and click on the Monitor tab, go
to Log Viewer, and select the Access tab. Via the message of a valid user, right-click the message
and select Access Record Details. Shown before are the results for the read-write-all-access user.
Please note you should also see RADIUS accounting records upon a user logging onto and
disconnecting from the ERS8600
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
At minimum, verify the following items:
Option Verify
Authentication Result If successful, Authenticated should be displayed. If not, verify the
device using the previous step and if this also fails, verify the Ignition
Server configuration.
Authorization Result If successful, Allow should be displayed. If not, verify the device using
the previous step and if this also fails, verify the Ignition Server
configuration.
User-Name Displays the name of the user id, in this example, a user id of 8600rwa
was used for the user with read-write-all-access rights.
Access Policy This field displays the Ignition Server policy used for this user which
should be ERS8600-Acess as configured for this example.
Policy Rule Used
Outbound Attribute
For this user, the Policy rule read-write-all-access as configured above
should be used which sends an outbound vendor specific attribute
value of 6 to the ERS8600 telling the switch this user has read-write-allaccess
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.2 Part 2: ERS8600 Configuration with Specific
Commands Disabled
In this part, we will use the same configuration used in the previous example, but, we will restrict
the read-write ERS8600 user (user name = 8600rw) to deny access to the CLI QoS and Filter
configuration (“config qos” or “config filter”).
2.2.1 ERS8600 Configuration
Enable the user access profile parameter on the ERS8600.
ERS8600-1 Step 1 – Enable the RADIUS cli-profile by setting the value to true
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.2.2 IDE Setup
2.2.2.1 Configure Outbound attributes to deny ERS8600 CLI commands
Using the same base configuration from the previous step, we will simple add the CLI commands
we wish to deny to the read-write user. In this example, this will apply only to the user 8600rw.
IDE Step 1 – IDE already has the vendor specific attributes defined, Bay Networks vendor
code 1584 using attribute types 194 and 195 for the ERS8600 which can be viewed by
going to Site Configuration -> Provisioning -> Vendors/VSAs -> Bay-Networks -> VSA Definitions.
IDE Step 2 – Go to Site Configuration -> Provisioning -> Outbound Attributes -> New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 3 – Via the Outbound Attribute window, type in a name for the attribute to be used
to restrict CLI commands (i.e. 8600-Command-Access as used in this example), click the
VSA radio button, select Bay-Networks via Vendor and ERS8xxx-Command-Access via
VSA. Click on OK when done
IDE Step 4 – Go to Site Configuration -> Provisioning -> Outbound Attributes -> New one
more time. Via the Outbound Attribute window, type in a name for the attribute to be used
to list the CLI commands (i.e. 8600-Command-List as used in this example), click the VSA
radio button, select Bay-Networks via Vendor and ERS8xxx-CLI-Commands via VSA. Click
on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 5 – Go to Site Configuration -> Provisioning -> Outbound Values -> New
IDE Step 6 – Using the Outbound Attribute created in Step 3, we will add a value of 0 to
restrict CLI command access. Start by entering a name via the Outbound Value Name:
window (i.e. ERS8600-Command-Access as used in this example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 7 – Select the Outbound Attributes name created in Step 3 (i.e. ERS8600Command-Access as used in this example) via the Choose Global Outbound Attribute: pull
down menu. In the Value Unsigned – 32 bit window, enter 0 (i.e. value of 0 signifies CLI
command restriction). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 8 – Go to Site Configuration -> Provisioning -> Outbound Values -> New again to
create the outbound attribute for deny access to the CLI command ‘config qos’. Using the
Outbound Attribute created in Step 4, we will add a string value of “config qos”. Start by
entering a name via the Outbound Value Name: window (i.e. 8600-Command-no-QoS as
used in this example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 9 – Select the Outbound Attributes name created in Step 4 (i.e. ERS8600Command-List as used in this example) via the Choose Global Outbound Attribute: pull
down menu. In the String window, enter config qos (i.e. this is the CLI command we wish
to restrict). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 10 – Go to Site Configuration -> Provisioning -> Outbound Values -> New again to
create the outbound attribute for deny access to the CLI command ‘config filter’. Using the
Outbound Attribute created in Step 4, we will add a string value of “config filter”. Start by
entering a name via the Outbound Value Name: window (i.e. 8600-Command-no-filter as
used in this example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 11 – Select the Outbound Attributes name created in Step 4 (i.e. ERS8600Command-List as used in this example) via the Choose Global Outbound Attribute: pull
down menu. In the String window, enter config filter (i.e. this is the CLI command we wish
to restrict). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
2.2.2.2 Modify the Authorization Policy for the ERS8600 read-write user
IDE Step 1 – Click on the policy created from the previous example, i.e. ERS8600-Access,
click on the Authorization Policy tab, select the read-write-access via the Rule Name
window, and click on Edit
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 2 – Make sure the read-write-access rule is selected and move all three RADIUS
attribute values we just created from the previous step from the All Outbound Values
window to the Provision With window
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3. ERS5600 Switch Configuration Example
For this configuration example, we will enable RADIUS user authentication on ERS500-1 using
the switch management port. We will configure the Identity Engines RADIUS server with the
following two users:
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3.1 ERS5600 Configuration
3.1.1 Enable RADIUS
Up to two RADIUS servers are supported on the ERS5600, 5500, 4500, or 2500 series switches.
For this configuration example we will simply configure one RADIUS server.
5698TFD-1-PWR(config)#radius-server host 47.133.56.101 key Nortel
5698TFD-1-PWR(config)#radius accounting enable
5698TFD-1-PWR(config)#cli password telnet radius
If the switch is used in a stack, enter the following:
5698TFD-1-PWR(config)#cli password stack telnet radius
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3.2 IDE Setup
3.2.1 Configure an Outbound Attribute on Ignition Server for Service-Type
The following chart displays the outbound attribute values required by the ERS5600, ERS5500,
ERS4500, or ERS2500 for each access level using RADIUS attribute type 6 (Service-Type).
Registry Value Description ERS Access Level
6 Administrative Read-Write-All-Access
7 NAS Prompt Read-Only-Access
IDE Step 1 – Go to Site Configuration -> Provisioning -> Outbound Attributes -> New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 2 – Via the Outbound Attribute window, type in a name for the attribute to be used
for access priority (i.e. Service-type-ERS as used in this example), click the RADIUS Attribute radio button and select Service-Type. Click on OK when done
IDE Step 4 – Go to Site Configuration -> Provisioning -> Outbound Values -> New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 5 – Using the Outbound Attribute created in Step 2, we will first add a value of 7
(NAS Prompt) for read-only-access. Start by entering a name via the Outbound Value Name: window (i.e. ERSro as used in this example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 6 – Select the Outbound Attributes name created in Step 3 (i.e. Service-type-ERS
as used in this example) via the Choose Global Outbound Attribute: pull down menu. In the Value Unsigned – 32 bit window, enter 7 (i.e. value of 7 signifies NAS Prompt for read-onlyaccess). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 7 – Go to Site Configuration -> Provisioning -> Outbound Values -> New again to
create the outbound attribute for read-write-access. Using the Outbound Attribute created
in Step 2, we will add a value of 6 for read-write-access. Start by entering a name via the
Outbound Value Name: window (i.e. ERSrwa as used in this example) and click on New
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 8 –Select the Outbound Attributes name created in Step 2 (i.e. Service-type-ERS
as used in this example) via the Choose Global Outbound Attribute: pull down menu. In the Value Unsigned – 32 bit window, enter 6 (i.e. value of 6 signifies Administrative for readwrite-access). Click on OK twice when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 2 – Enter the user name for read-only-access via User Name: (i.e. 5600ro as used
in this example) and enter the password for this user via Password and Confirm Password.
Click on OK when done. If you wish, you can also change the expiry date via Password Expires if you do not wish to use the default setting of one year
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 3 – Repeat step 2 again by clicking on New to add the read-write-access user.
Enter the user name for read-write-access via User Name: (i.e. 5600rw as used in this
example) and enter the password for this user via Password and Confirm Password. Click
on OK when done. If you wish, you can also change the expiry date via Password Expires
if you do not wish to use the default setting of one year
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3.2.3 Add Access Policy
IDE Step 1 – Go to Site Configuration -> Access Policies -> RADIUS. Right-click RADIUS
and select New Access Policy. Enter a policy name, i.e. ERS-access as used in this
example and click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 7 – Once the Edit Authorization Policy window pops up, click on Add. First, we
will add a rule for read-only. When the New Rule window pops up, we will name the rule
read-only as shown below
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 8 – For this example, we are simply going to look for the read-only-user user-id.
From Attribute Category, select User and scroll down and select user-id. Select Equal To
with Format of None and enter the read-only-access user id, i.e. 5600ro as used in this
example, in the Static Value window as shown below. Click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 9 – Via Action, select Allow. From the All Outbound Values window, select the
output attribute we created above named ERSro and click on the less-than arrow key to
move the attribute to the Provision With win dow
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 10 – Next, we will add a rule for read-write-access. Start by clicking on Add and
when the New Rule window pops up, add an appropriate name for this rule, i.e. read-write
as used in this example
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 12 – For this example, we are simply going to look for the read-write user-id.
From Attribute Category, select User and scroll down and select user-id. Select Equal To
with Format of None and enter the read-write user id, i.e. 5600rwa as used in this example,
in the Static Value window as shown below. Click on OK when done
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 13 – Via Actions, select Allow. From the All Outbound Values window, select the
output attribute we created above named 5600rwa and click on the less-than arrow key to
move the attribute to the Provision With win dow
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3.2.4 Add the Nortel ERS5600-1 switch as an RADIUS Authenticator
For Ignition Server to process the Nortel switch RADIUS requests, each switch must be added as
an Authenticator.
IDE Step 1 – Go to Site Configuration -> Authenticators -> default. For example, we will
create new container named Nortel Switch by right clicking default and selecting Add Container.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
IDE Step 3 – Enter the settings as shown below making sure you select the policy we
created above named ERS-access via Access Policy. Leave Enable Authenticator and
Enable RADIUS Access checked. Click on OK when done.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3.3 Verification
3.3.1 Verify User Authentication
You can test user authentication for the ERS5600 users configured on IDE by entering the user
name and password.
Step 1 – Via Ignition Dashboard, select the IP address of the Ignition Server, click on the
Troubleshoot tab, go to Directory Service Debugger and select the Process Request tab. You can
also simple test user authentication as we did for the ERS8600 via the Auth User tab. Enter a valid
user name and password configured for the ERS5600 and click on Send Request
Via Dashboard, verify the following information:
Option Verify
Results If successful, you should get several messages indicating the internal
user lookup and authentication was successful providing you entered
the correct user name and password.
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
3.3.2 Verify user authentication from ERS switch
You can view the authentication details via Ignition Dashboard which provides extensive details
about the device or user.
Step 1 – In Dashboard, select the IP address of the Ignition Server and click on the Monitor tab, go
to Log Viewer, and select the Access tab. Via the message of a valid user, right-click the message
and select Access Record Details. Shown before are the results for the read-write-all-access user.
Please note you should also see RADIUS accounting records upon a user logging onto and
disconnecting from the ERS5600
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
At minimum, verify the following items:
Option Verify
Authentication Result If successful, Authenticated should be displayed. If not, verify the
device using the previous step and if this also fails, verify the Ignition
Server configuration.
Authorization Result If successful, Allow should be displayed. If not, verify the device using
the previous step and if this also fails, verify the Ignition Server
configuration.
User-Name Displays the name of the user id, in this example, a user id of 5600rwa
was used for the user with read-write-all-access rights.
Access Policy This field displays the Ignition Server policy used for this user which
should be ERS-access as configured for this example.
Policy Rule Used
Outbound Attribute
For this user, the Policy rule read-write as configured above should be
used which sends an outbound vendor specific attribute value of 6 to
the ERS8600 telling the switch this user has read-write-all-access
Nortel Switch User Authentication
Technical Configuration Guide v1.0 NN48500-589
Contact us
If you purchased a service contract for your Nortel product from a distributor or authorized
reseller, contact the technical support staff for that distributor or reseller for assistance.
If you purchased a Nortel Networks service program, contact Nortel Technical Support. To obtain
contact information online, go to www.nortel.com/contactus
.
From the Technical Support page, you can open a Customer Service Request online or find the
telephone number for the nearest Technical Solutions Center. If you are not connected to the
Internet, call 1-800-4NORTEL (1-800-466-7835) to learn the telephone number for the nearest
Technical Solutions Center.
An Express Routing Code (ERC) is available for many Nortel products and services. When you
use an ERC, your call is routed to a technical support person who specializes in supporting that
product or service. To locate an ERC for your product or service, go to www.nortel.com/erc