Summit 300-48 Switch Software User Guide 93
7 Unified Access Security
This chapter describes the security features of the Summit 300-48 switch and includes information on
the following topics:
• Overview of Security on page 93
• User Access Security on page 94
• Network Login on page 96
• MAC RADIUS on page 107
• Network Security Policies for Wireless Interfaces on page 107
• CLI Commands for Security on the Switch on page 111
• Secure Web Login Access on page 113
• Example Wireless Configuration Processes on page 115
Overview of Security
The Extreme Unified Access™ Security architecture provides secure access for all wired and wireless
stations within the unified network. You can maintain the network with a single, unified security policy,
provide service to all stations without requiring upgrades, and take advantage of integrated policy and
management capabilities not available in overlay networks or those with “thick” access points. Unified
Access Security provides the following capabilities:
• Consolidated management — Up to 48 wireless ports from a single Summit 300-48 switch, greater
network support with reduced management overhead
• Scalable encryption — ASIC based AES encryption, WPA with TKIP support, and RC4 based WEP
support on the Altitude 300 wireless port
• 802.1x Authentication — 802.1x authentication (PEAP, EAP-TTLS, EAP-TLS)
• Web-based network login—http and https based user authentication
The unified structure simplifies security policies without compromising protection and provides the
following benefits:
• Single user experience — Same authentication procedures for wired and wireless users
• Unified management — Single management platform for wired and wireless networks
• Unified configuration — Consistent CLI for wired and wireless functions