EasyManua.ls Logo

Enterasys SecureStack B3

Enterasys SecureStack B3
582 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Overview of Security Methods
20-2 Security Configuration
SecureStackB3ports.FordetailsonusingCLIcommandstoconfigure802.1X,referto
Configuring802.1XAuthenticationonpage 209.
•MACAuthenticationprovidesamechanismforadministratorstosecurelyauthenticate
sourceMACaddressesandgrantappropriateaccesstoenduserdevicescommunicatingwith
SecureStackB3ports.Fordetails,refer
toConfiguringMACAuthenticationonpage 2019.
•MultipleAuthenticationMethodsallowsuserstoauthenticateusingmultiplemethodsof
authenticationonthesameport.Fordetails,refertoConfiguringMultipleAuthentication
Methodsonpage 2030.
•MultiUserAuthenticationOntheSecureStackB3,theonlytypeofmultipleuser
authentication
supportedis“User+IPPhone”.TheUser+IPPhoneauthenticationfeature
supportsauthenticationandauthorizationoftwodevices,specificallyaPCcascadedwithan
IPphone,onasingleportontheB3.TheIPphonemust a uthenticateusingMACor802.1X
authentication,buttheusermayauthentica te
byanymethod.Thisfeatureallowsboththe
usersPCandIPphonetosimultaneouslyauthenticateonasingleportandeachreceivea
uniquelevelofnetworkaccess.Fordetails,refertoConfiguringMultiUserAuthentication
(User+IPphone) onpage 2030.
•RFC3580TunnelAttributesprovidea
mechanismtocontainan802.1Xauthenticatedusertoa
VLANregardlessofthePVID.UptothreeuserscanbeconfiguredperGigabitport.Referto
ConfiguringVLANAuthorization(RFC3580)onpage 2041.
•MACLockinglocksaporttooneormoreMACaddresses,preventingtheuseof
unauthorizeddevicesandMACspoofingontheportFordetails,refertoConfiguringMAC
Lockingonpage 2046.
•PortWebAuthentication(PWA)locksdownaportauserisattached tountilaftertheuser
logsinusingawebbrowsertoaccesstheswitch.Theswitchwillpass
alllogininformation
fromtheendstationtoaRADIUSserverforauthenticationbeforeturningtheporton.PWAis
analternativeto802.1XandMACauthentication.Fordetails,refertoConfiguringPortWeb
Authentication(PWA)onpage 2057.
•SecureShell(SSH)providessecureTelnet.Fordetails,referto
ConfiguringSecureShell
(SSH)onpage 2069.
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment
IfyouconfigureanauthenticationmethodthatrequirescommunicationwithaRADIUSserver,
youcanusetheRADIUSFilterIDattributetodynamicallyassignapolicyprofileand/or
managementleveltoauthenticatingusersand/ordevices.
TheRADIUSFilterIDattributeissimplyastringthatisformattedintheRADIUSAccess
Accept
packetsentbackfromtheRADIUSservertotheswitchduringtheauthenticationprocess.
EachusercanbeconfiguredintheRADIUSserverdatabasewithaRADIUSFilterIDattribute
thatspecifiesthenameofthepolicyprofileand/ormanagementleveltheusershouldbeassigned
uponsuccessfulauthentication.During
theauthenticationprocess,whentheRADIUSserver
returnsaRADIUSAccessAcceptmessagethatincludesaFilterIDmatchingapolicyprofilename
Note: To configure EAP pass-through, which allows client authentication packets to be forwarded
through the switch to an upstream device, 802.1X authentication must be globally disabled with the
set dot1x command.
Note: B3 devices support up to eight authenticated users per port.

Table of Contents

Related product manuals