EasyManua.ls Logo

Enterasys SecureStack B3

Enterasys SecureStack B3
582 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SecureStack B3 Configuration Guide 20-1
20
Security Configuration
ThischapterdescribestheSecurityConf igurationsetofcommandsandhowtousethem.
Overview of Security Methods
Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowedtoaccess,
monitor,andmanagetheswitch.
•LoginuseraccountsandpasswordsusedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,refertoSettingUserAccountsandPasswords
on
page 31.
•HostAccessControlAuthentication(HACA)authenticatesuseraccessofTelnet
management,consolelocalmanagementandWebViewviaacentralRADIUSClient/Server
application.WhenRADIUSisenabled,thisessentiallyoverridesloginuseraccounts.When
HACAisactiveperavalidRADIUSconfiguration,theusernamesandpasswordsused
to
accesstheswitchviaTelnet,SSH,WebView,andCOMportswillbevalidatedagainst the
configuredRADIUSserver.OnlyinthecaseofaRADIUStimeoutwillthosecredentialsbe
comparedagainstcredentialslocallyconfiguredontheswitch.
Fordetails,referto
ConfiguringRADIUSonpage 203.
•SNMPuserorcommunitynamesallowsaccesstotheSecureStackB3switchviaanetwork
SNMPmanagementapplication.Toaccesstheswitch,youmustenteranSNMPuseror
communitynamestring.Thelevelofmanagementaccessisdependenton
theassociated
accesspolicy.Fordetails,refertoChapter 6.
802.1XPortBasedNetworkAccessControlusingEAPOL(ExtensibleAuthentication
Protocol)providesamechanismviaaRADIUSserverforadministratorstosecurely
authenticateandgrantappropriateaccesstoenduserdevicescommunicatingwith
For information about... Refer to page...
Overview of Security Methods 20-1
Configuring RADIUS 20-3
Configuring 802.1X Authentication 20-9
Configuring MAC Authentication 20-19
Configuring Multiple Authentication Methods 20-30
Configuring VLAN Authorization (RFC 3580) 20-41
Configuring MAC Locking 20-46
Configuring Port Web Authentication (PWA) 20-57
Configuring Secure Shell (SSH) 20-69

Table of Contents

Related product manuals