SteelHeadā„¢ Deployment Guide : Authentication, Security, Operations, and Monitoring : Overview of Authentication
  
Overview of Authentication
You can log in to an SteelHead with a RADIUS or TACACS+ authentication system for administrative and monitoring purposes. The following methods for user authentication are provided with the SteelHead:
  • Local
  • RADIUS
  • TACACS+
  • For information about per-command authorization and per-command accounting, see the Riverbed Command-Line Interface Reference Manual.
    The order in which authentication is attempted is based on the order specified in the AAA method list. The authentication list provides backup authentication methods in case one method fails to authenticate the server. If the first server is unavailable, the next server in the list is contacted depending on the RADIUS/TACACS+ settings.
    If there are multiple servers within a method (assuming the method is contacting authentication servers) and a server time-out is encountered, the next server in the list is tried. If the current server being contacted issues an authentication reject, another server is contacted according to the RADIUS/TACACS+ setting. If none of the methods validate a user, the user is not allowed access to the server.
    The SteelHead does not have the ability to set a per interface authentication policy. The same default authentication method list is used for all interfaces. You cannot configure authentication methods with subsets of the RADIUS or TACACS+ servers specified (that is, there are no server groups).
    For information about Windows domain authentication for encrypted MAPI and SMB signed CIFS traffic see the SteelHead Deployment Guide - Protocols.