Model: G6
Software: Version: 12.8.0a
After logging into the Microsens switch's management panel, open the RADIUS tab in the Management section. Then configure a new RADIUS server. You can add a new entry using the blue + in the lower right corner, specifying the name of the server in the add table entry field beforehand.
The fields should be completed as follows:
Authorization:
Name: the name of the NACVIEW server (authorization).Server type: RADIUSHost address: the VRRP address of the NACVIEW server.UDP port: 1812Interim interval: 0.Accounting:
Name: name of NACVIEW server (accounting).Server type: RADIUSHost address: VRRP address of the NACVIEW server.UDP port: 1813Interim interval: the amount of time between Accounting packets, e.g. 600 (10 minutes).Next, save the configuration (Apply to running configuration button). Then enter the RADIUS key in the fields under Enter shared secret. Then generate the RADIUS key hash using the Enter shared secret button, then save (Apply to running configuration).

Go to the PortAccess tab, then to the Basic configuration tab. Set the fields as follows:
Enable port access control: true.Reauthemtication period: 600-1800 (10-30 min).NAS identifier: switch name.Mac separator: : (colon).Mac spelling: UPPER_CASEMac password source: USE_MACMac password string: NOPASSWORDPrimary auth server name: NACVIEW server name from "Configuring connection to RADIUS server".Primary acct server name: name of the NACVIEW server from "Configuration of connection to RADIUS server".Next, save the configuration (Apply to running configuration button).

Authorize mode field to ALWAYS_AUTHORIZED.Open the Port Configuration tab. Set the following fields for all interfaces on which authorization is to be enabled (port 1/1 in the example). Then confirm with Apply to running configuration.
Authorize mode: 802_1X_VIA_RADIUSAuthorize priority: PREFER_802_1XUnathorized mode: BLOCKEDAuth fail timer: 90
Authorize mode: MAC_VIA_RADIUSAuthorize priority: PREFER_MACUnathorized mode: BLOCKEDAuth fail timer: 90Authorize mode: MAC_OR_802_1X_VIA_RADIUSAuthorize priority: PREFER_802_1XUnathorized mode: BLOCKEDAuth fail timer: 30After logging into the Microsens switch's management panel, open the RADIUS tab in the Management section. Then configure a new RADIUS server. You can add a new entry using the blue + in the lower right corner, specifying the name of the server in the add table entry field beforehand.
The fields should be completed as follows:
Authorization:
Name: NACVIEW server name (authorization).Server type: TACACS.Host address: the VRRP address of the NACVIEW server.UDP port: 49Interim interval: 0.Next, save the configuration (Apply to running configuration button). Next, enter the RADIUS key in the fields under Enter shared secret. Then generate the RADIUS key hash using the Enter shared secret button, then save (Apply to running configuration).

If you use the TACACS server as a means of authorization, create a user with the set privileges (Management -> Access -> User) and assign him to the appropriate privilege level (priv. lvl 0/1/15) of TACACS. Then, in the NACVIEW policy, assign the appropriate authorization level using the standard attribute.
After logging into the Microsens switch's management panel, open the RADIUS tab in the Management section. Then configure a new RADIUS server. You can add a new entry using the blue + in the lower right corner, specifying the name of the server in the add table entry field beforehand.
The fields should be completed as follows:
Authorization:
Name: the name of the NACVIEW server (authorization).Server type: RADIUSHost address: the VRRP address of the NACVIEW server.UDP port: 1849Interim interval: 0.Next, save the configuration (Apply to running configuration button). Next, enter the RADIUS key in the fields under Enter shared secret. Then generate the RADIUS key hash using the Enter shared secret button, then save (Apply to running configuration).

If you use a RADIUS server as a means of authorization, create a user with the given permissions (Management -> Access -> User) and assign it to the appropriate policy using the Filter-ID attribute.
After logging into the Microsens switch's management panel, open the Access tab in the Management section. Set the appropriate authentication mode and specify the TACACS server and mapping of local users to authorization levels (Management.access.tacacs) or specify a RADIUS server.

Then save the configuration (button Apply to running configuration).
Open the SNMP tab in the Management section.

Complete the device_info table as required. enable snmp v1, enable snmp v2c and permit v1v2 set commands should be set to 0 (disabled).
enable snmp v3 should be set to 1 (enabled), security model to VACM.
Then confirm with Apply to running configuration.
Next, configure the user whose credentials will be used by NACVIEW.
On the Access tab in the Management section, open the Groups tab. Either delete from the predefined limited group or create a group with the appropriate credentials. Then in the Users tab, add a new user:
name: username.associated groups: appropriate permission groups.general access rights: READ_ONLYenable telnet access: 0enable ssh access: 0enable web access: 0enable snmp access: 1enable nmp access: 0enable ftp access: 0enter password: device login password, negligible for SNMP.snmp v3 security level: AUTH_PRIVsnmp v3 auth algorithm: SHAsnmp v3 privacy algorithm: AESenter snmp v3 auth password, enter snmp v3 privacy password: enter SNMPv3 passwords and confirm with enter snmp v3 auth/priv password.


Open the SNMP tab in the Management section.

Complete the device_info table as required.
enable snmp v1 and permit v1v2 set commands should be set to 0 (disabled), enable snmp v2c to 1 (enabled).
Set SNMPv2 community(password) (get community) and possibly additionally snmp v1v2 username field to restrict access.
Then confirm with Apply to running configuration.
Open the Logging tab in the Management section, then go to the Targets tab.

Add a new table entry (add table entry), then set the following values:
host address: VRRP NACVIEW address.log type: syslogdetail level: verboseminimum severity: debuglog config changes: 1Then confirm with Apply to running configuration.