EasyManua.ls Logo

Enterasys D-Series

Enterasys D-Series
540 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Overview of Security Methods
17-2 Security Configuration
onusingCLIcommandstoconfigure802.1X,refertoConfiguring802.1XAuthenticationon
page 1711.
•MACAuthenticationprovidesamechanismforadministratorstosecurelyauthenticate
sourceMACaddressesandgrantappropriateaccesstoenduserdevicescommunicatingwith
DSeriesports.Fordetails,refertoConfiguringMACAuthentication
onpage 1721.
•MultipleAuthenticationMethodsallowsuserstoauthenticateusingmultiplemethodsof
authenticationonthesameport.Fordetails,refertoConfiguringMultipleAuthentication
Methodsonpage 1733.
•MultiUserAuthenticationUser+IPPhone.TheUser+IPPhoneauthenticationfeature
supportsauthenticationandauthorizationof
twodevices,specificallyaPCcascadedwithan
IPphone,onasingleportontheD2.TheIPphonemustauthenticateusingMACor802.1X
authentication,buttheusermayauthenticatebyanymethod.Thisfeatureallowsboththe
usersPCandIPphonetosimultaneouslyauthenticateona
singleportandeachreceivea
uniquelevelofnetworkaccess.Fordetails,refertoConfiguringMultiUserAuthentication
(User+IPphone)onpage 1733.
•RFC3580TunnelAttributesprovideamechanismtocontainan802.1XauthenticatedorMAC
authenticatedusertoaVLANregardlessofthePVID.Refer
toConfiguringVLAN
Authorization(RFC3580)onpage 1745.
•MACLockinglocksaporttooneormoreMACaddresses,preventingtheuseof
unauthorizeddevicesandMACspoofingontheportFordetails,refertoConfiguringMAC
Lockingonpage 1751.
•PortWebAuthentication(PWA)passesall
logininformationfromtheendstation toa
RADIUSserverforauthenticationbeforeallowingausertoaccessthenetwork.PWAisan
alternativeto802.1XandMACauthentication.Fordetails,refertoConfiguringPortWeb
Authentication(PWA)onpage 1762.
•SecureShell(SSH)providessecureTelnet.For
details,refertoConfiguringSecureShell
(SSH)onpage 1774.
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment
IfyouconfigureanauthenticationmethodthatrequirescommunicationwithaRADIUSserver,
youcanusetheRADIUSFilterIDattributetodynamicallyassignapolicyprofileand/or
managementleveltoauthenticatingusersand/ordevices.
TheRADIUSFilterIDattributeissimplyastringthatisformattedintheRADIUSAccess
Accept
packetsentbackfromtheRADIUSservertotheswitchduringtheauthenticationprocess.
EachusercanbeconfiguredintheRADIUSserverdatabasewithaRADIUS FilterIDattribute
thatspecifiesthenameofthepolicyprofileand/ormanagementleveltheusershouldbeassigned
uponsuccessfulauthentication.During
theauthenticationprocess,whentheRADIUSserver
returnsaRADIUSAccessAcceptmessagethatincludesaFilterIDmatchingapolicyprofilename
Note: To configure EAP pass-through, which allows client authentication packets to be forwarded
through the switch to an upstream device, 802.1X authentication must be globally disabled with the
set dot1x command.
Notes: The D2 supports up to two authenticated users per port.
The D2 cannot simultaneously support Policy and RFC 3580 on the same port. If multiple users are
configured to use a port, and the D2 is then switched from "policy" mode to "tunnel" mode (RFC-
3580 VLAN to port mapping), the total number of users supported to use a port will be reset to one.
RFC-3580 VLAN authorization is not supported by PWA authentication.

Table of Contents

Related product manuals