EasyManua.ls Logo

Enterasys 1G58x-09 - Page 23

Enterasys 1G58x-09
808 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide xxi
14
SECURITY CONFIGURATION
14.1 Overview of Security Methods ...................................................................... 14-1
14.2 Process Overview: Security Configuration.................................................... 14-2
14.3 Security Configuration Command Set........................................................... 14-3
14.3.1 Configuring RADIUS ..................................................................... 14-3
14.3.1.1 show radius ............................................................... 14-4
14.3.1.2 set radius ................................................................... 14-6
14.3.1.3 clear radius ................................................................ 14-8
14.3.1.4 show radius accounting ........................................... 14-10
14.3.1.5 set radius accounting............................................... 14-12
14.3.1.6 clear radius accounting............................................ 14-14
14.3.2 Configuring 802.1X Authentication ............................................. 14-15
14.3.2.1 show dot1x .............................................................. 14-16
14.3.2.2 show dot1x auth-config............................................ 14-19
14.3.2.3 set dot1x .................................................................. 14-20
14.3.2.4 set dot1x auth-config ............................................... 14-21
14.3.2.5 set dot1x port........................................................... 14-23
14.3.2.6 clear dot1x auth-config ............................................ 14-24
14.3.2.7 show eapol .............................................................. 14-25
14.3.2.8 set eapol .................................................................. 14-29
14.3.3 Configuring MAC Authentication................................................. 14-30
14.3.3.1 show macauthentication .......................................... 14-31
14.3.3.2 show macauthentication session............................. 14-34
14.3.3.3 set macauthentication.............................................. 14-35
14.3.3.4 set macauthentication password ............................. 14-36
14.3.3.5 set macauthentication port ...................................... 14-37
14.3.3.6 set macauthentication portinitialize.......................... 14-38
14.3.3.7 set macauthentication macinitialize ......................... 14-38
14.3.3.8 set macauthentication reauthentication ................... 14-39
14.3.3.9 set macauthentication portreauthenticate................ 14-40
14.3.3.10 set macauthentication macreauthenticate ............... 14-40
14.3.3.11 set macauthentication reauthperiod ........................ 14-41
14.3.3.12 set macauthentication quietperiod........................... 14-42
14.3.4 Configuring MAC Locking ........................................................... 14-43
14.3.4.1 show maclock .......................................................... 14-44
14.3.4.2 show maclock stations............................................. 14-46
14.3.4.3 set maclock enable.................................................. 14-48
14.3.4.4 set maclock disable ................................................. 14-49
14.3.4.5 set maclock.............................................................. 14-50
14.3.4.6 set maclock firstarrival ............................................. 14-51
14.3.4.7 set maclock static .................................................... 14-52
14.3.4.8 set maclock move.................................................... 14-53

Table of Contents