EasyManua.ls Logo

Enterasys D-Series - Chapter 17: Security Configuration; Overview of Security Methods

Enterasys D-Series
540 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Enterasys D-Series CLI Reference 17-1
17
Security Configuration
ThischapterdescribestheSecurityConf igurationsetofcommandsandhowtousethem.
Overview of Security Methods
Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowe d toaccess,
monitor,andmanagethe switch.
•LoginuseraccountsandpasswordsusedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,refertoSettingUserAccountsandPasswords
on
page 32.
•HostAccessControlAuthentication(HACA)a uthenti catesuseraccessofTelnet
management,consolelocalmanagementandWebViewviaacentralRADIUSClient/Server
application.WhenRADIUSisenabled,thisessentiallyoverridesloginuseraccounts.When
HACAisactiveperavalidRADIUSconfiguration,theusernamesandpasswordsused
to
accesstheswitchviaTelnet,SSH,WebView,andCOMportswillbevalidatedagainstthe
configuredRADIUSserver.OnlyinthecaseofaRADIUStimeoutwillthosecredentialsbe
comparedagainstcredentialslocallyconfiguredontheswitch.
Fordetails,referto
ConfiguringRADIUSonpage 173.
•SNMPuserorcommunitynamesallowsaccesstotheDSeriesswitchviaanetworkSNMP
managementapplication.Toaccesstheswitch,youmustenteranSNMPuserorcommunity
namestring.Thelevelofmanagementaccessisdependenton
theassociatedaccesspolicy.For
details,refertoChapter 7 .
802.1XPortBasedNetworkAccessControlusingEAPOL(ExtensibleAuthenticationProtocol)
providesamechanismviaaRADIUSserverforadministratorstosecurelyauthenticateand
grantappropriateaccesstoenduserdevicescommunicatingwithDSeriesports.Fordetails
For information about... Refer to page...
Overview of Security Methods 17-1
Configuring RADIUS 17-3
Configuring 802.1X Authentication 17-11
Configuring MAC Authentication 17-21
Configuring Multiple Authentication Methods 17-33
Configuring VLAN Authorization (RFC 3580) 17-45
Configuring MAC Locking 17-51
Configuring Port Web Authentication (PWA) 17-62
Configuring Secure Shell (SSH) 17-74

Table of Contents

Related product manuals