EasyManuals Logo

Enterasys SecureStack C2 User Manual

Enterasys SecureStack C2
607 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #525 background imageLoading...
Page #525 background image
SecureStack C2 Configuration Guide 18-1
18
Security Configuration
ThischapterdescribestheSecurityConf igurationsetofcommandsandhowtousethem.
Overview of Security Methods
Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowedtoaccess,
monitor,andmanagetheswitch.
•LoginuseraccountsandpasswordsusedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,refertoSettingUserAccountsandPasswords
on
page 31.
•HostAccessControlAuthentication(HACA)authenticatesuseraccessofTelnet
management,consolelocalmanagementandWebViewviaacentralRADIUSClient/Server
application.WhenRADIUSisenabled,thisessentiallyoverridesloginuseraccounts.When
HACAisactiveperavalidRADIUSconfiguration,theusernamesandpasswordsused
to
accesstheswitchviaTelnet,SSH,WebView,andCOMportswillbevalidatedagainst the
configuredRADIUSserver.OnlyinthecaseofaRADIUStimeoutwillthosecredentialsbe
comparedagainstcredentialslocallyconfiguredontheswitch.
Fordetails,referto
ConfiguringRADIUSonpage 183.
•SNMPuserorcommunitynamesallowsaccesstotheSecureStackC2switchviaanetwork
SNMPmanagementapplication.Toaccesstheswitch,youmustenteranSNMPuseror
communitynamestring.Thelevelofmanagementaccessisdependenton
theassociated
accesspolicy.Fordetails,refertoChapter 6.
802.1XPortBasedNetworkAccessControlusingEAPOL(ExtensibleAuthentication
Protocol)providesamechanismviaaRADIUSserverforadministratorstosecurely
For information about... Refer to page...
Overview of Security Methods 18-1
Configuring RADIUS 18-3
Configuring 802.1X Authentication 18-9
Configuring MAC Authentication 18-19
Configuring Multiple Authentication Methods 18-30
Configuring VLAN Authorization (RFC 3580) 18-41
Configuring MAC Locking 18-46
Configuring Port Web Authentication (PWA) 18-57
Configuring Secure Shell (SSH) 18-68
Configuring Access Lists 18-70

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Enterasys SecureStack C2 and is the answer not in the manual?

Enterasys SecureStack C2 Specifications

General IconGeneral
BrandEnterasys
ModelSecureStack C2
CategorySwitch
LanguageEnglish

Related product manuals