EasyManua.ls Logo

3Com 4210G Series - Security Volume

3Com 4210G Series
1133 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
2-7
Features Description
Appendix
This document describes:
z Acronym
z Default Priority Mapping Tables
z Introduction to Packet Precedences
Security Volume
Table 2-6 Features in the Security volume
Features Description
AAA
Authentication, Authorization and Accounting (AAA) provide a uniform
framework used for configuring these three security functions to
implement the network security management. This document describes:
z Introduction to AAA, RADIUS and HWTACACS
z AAA configuration
z RADIUS configuration
z HWTACACS configuration
802.1X
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network
access control protocol that is used as the standard for LAN user access
authentication. This document describes:
z 802.1X overview
z 802.1X configuration
z 802.1X Guest-VLAN configuration
EAD Fast Deployment
In conjunction with 802.1X, EAD Fast Deployment can have an access
switch to force all attached devices to download and install the EAD client
before permitting them to access the network. This document describes:
z EAD Fast Deployment overview
z EAD Fast Deployment configuration
HABP
On an HABP-capable switch, HABP packets can bypass 802.1X
authentication and MAC authentication, allowing communication among
switches in a cluster. This document describes:
z Introduction to HABP
z HABP configuration
MAC Authentication
MAC authentication provides a way for authenticating users based on
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document describes:
z RADIUS-Based MAC Authentication
z Local MAC Authentication
Port Security
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document describes:
z Enabling Port Security
z Setting the Maximum Number of Secure MAC Addresses
z Setting the Port Security Mode
z Configuring Port Security Features
z Configuring Secure MAC Addresses
z Ignoring Authorization Information from the Server

Table of Contents

Other manuals for 3Com 4210G Series

Related product manuals