Table of Contents
RUGGEDCOM ROX II
CLI User Guide
xii
6.3Enabling/Disabling Brute Force Attack Protection ......................................................................... 127
6.4Enabling/Disabling Compact Flash Card Removal Detection .......................................................... 128
6.5Enabling/Disabling SYN Cookies ................................................................................................. 129
6.6Managing Port Security ............................................................................................................. 129
6.6.1Port Security Concepts .................................................................................................... 130
6.6.1.1Static MAC Address-Based Authentication .............................................................. 130
6.6.1.2IEEE 802.1x Authentication .................................................................................. 130
6.6.1.3IEEE 802.1X Authentication with MAC Address-Based Authentication ....................... 131
6.6.1.4Assigning VLANS with Tunnel Attributes ................................................................ 132
6.6.2Configuring Port Security ................................................................................................ 132
6.6.3Viewing the Security Status of Switched Ethernet Ports ..................................................... 134
6.7Managing User Authentication ................................................................................................... 134
6.7.1Setting the User Authentication Mode ............................................................................. 135
6.7.2Managing User Authentication Keys ................................................................................ 135
6.7.2.1Determining Which Keys are Associated to a User .................................................. 136
6.7.2.2Adding a User Authentication Key ........................................................................ 136
6.7.2.3Deleting a User Authentication Key ....................................................................... 137
6.7.2.4Associating/Disassociating a User Authentication Key ............................................. 137
6.7.3Managing RADIUS Authentication .................................................................................... 138
6.7.3.1Configuring RADIUS Authentication for LOGIN Services ........................................... 139
6.7.3.2Configuring RADIUS Authentication for PPP Services ............................................... 140
6.7.3.3Configuring RADIUS Authentication for Switched Ethernet Ports .............................. 141
6.7.4Configuring TACACS+ Authentication ............................................................................... 141
6.8Managing Certificates and Keys ................................................................................................. 143
6.8.1Viewing the Local Host SSH/RSA Public Key ...................................................................... 143
6.8.2Managing the Trusted Certificate Store ............................................................................ 144
6.8.2.1Configuring the Trusted Certificate Store ............................................................... 144
6.8.2.2Enabling/Disabling the Trusted Certificate Store ..................................................... 144
6.8.2.3List of Root Certificates in the Trusted Certificate Store ........................................... 145
6.8.3Managing CA Certificates for the Trusted Certificate Store ................................................. 171
6.8.3.1Viewing a List of CA Certificates Added to the Trusted Certificate Store ..................... 171
6.8.3.2Adding a CA Certificate to the Trusted Certificate Store ........................................... 171
6.8.3.3Deleting a CA Certificate from the Trusted Certificate Store ..................................... 172
6.8.4Managing CA Certificates and CRLs .................................................................................. 172
6.8.4.1Viewing a List of CA Certificates and CRLs ............................................................. 172
6.8.4.2Viewing the Status of a CA Certificate and CRL ...................................................... 172
6.8.4.3Adding a CA Certificate and CRL ........................................................................... 174
6.8.4.4Deleting a CA Certificate and CRL ......................................................................... 175
6.8.5Managing Private Keys ................................................................................................... 175
6.8.5.1Viewing a List of Private Keys ............................................................................... 175