EasyManuals Logo
Home>Siemens>Network Hardware>RUGGEDCOM ROX II

Siemens RUGGEDCOM ROX II User Manual

Siemens RUGGEDCOM ROX II
798 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #12 background imageLoading...
Page #12 background image
Table of Contents
RUGGEDCOM ROX II
CLI User Guide
xii
6.3Enabling/Disabling Brute Force Attack Protection ......................................................................... 127
6.4Enabling/Disabling Compact Flash Card Removal Detection .......................................................... 128
6.5Enabling/Disabling SYN Cookies ................................................................................................. 129
6.6Managing Port Security ............................................................................................................. 129
6.6.1Port Security Concepts .................................................................................................... 130
6.6.1.1Static MAC Address-Based Authentication .............................................................. 130
6.6.1.2IEEE 802.1x Authentication .................................................................................. 130
6.6.1.3IEEE 802.1X Authentication with MAC Address-Based Authentication ....................... 131
6.6.1.4Assigning VLANS with Tunnel Attributes ................................................................ 132
6.6.2Configuring Port Security ................................................................................................ 132
6.6.3Viewing the Security Status of Switched Ethernet Ports ..................................................... 134
6.7Managing User Authentication ................................................................................................... 134
6.7.1Setting the User Authentication Mode ............................................................................. 135
6.7.2Managing User Authentication Keys ................................................................................ 135
6.7.2.1Determining Which Keys are Associated to a User .................................................. 136
6.7.2.2Adding a User Authentication Key ........................................................................ 136
6.7.2.3Deleting a User Authentication Key ....................................................................... 137
6.7.2.4Associating/Disassociating a User Authentication Key ............................................. 137
6.7.3Managing RADIUS Authentication .................................................................................... 138
6.7.3.1Configuring RADIUS Authentication for LOGIN Services ........................................... 139
6.7.3.2Configuring RADIUS Authentication for PPP Services ............................................... 140
6.7.3.3Configuring RADIUS Authentication for Switched Ethernet Ports .............................. 141
6.7.4Configuring TACACS+ Authentication ............................................................................... 141
6.8Managing Certificates and Keys ................................................................................................. 143
6.8.1Viewing the Local Host SSH/RSA Public Key ...................................................................... 143
6.8.2Managing the Trusted Certificate Store ............................................................................ 144
6.8.2.1Configuring the Trusted Certificate Store ............................................................... 144
6.8.2.2Enabling/Disabling the Trusted Certificate Store ..................................................... 144
6.8.2.3List of Root Certificates in the Trusted Certificate Store ........................................... 145
6.8.3Managing CA Certificates for the Trusted Certificate Store ................................................. 171
6.8.3.1Viewing a List of CA Certificates Added to the Trusted Certificate Store ..................... 171
6.8.3.2Adding a CA Certificate to the Trusted Certificate Store ........................................... 171
6.8.3.3Deleting a CA Certificate from the Trusted Certificate Store ..................................... 172
6.8.4Managing CA Certificates and CRLs .................................................................................. 172
6.8.4.1Viewing a List of CA Certificates and CRLs ............................................................. 172
6.8.4.2Viewing the Status of a CA Certificate and CRL ...................................................... 172
6.8.4.3Adding a CA Certificate and CRL ........................................................................... 174
6.8.4.4Deleting a CA Certificate and CRL ......................................................................... 175
6.8.5Managing Private Keys ................................................................................................... 175
6.8.5.1Viewing a List of Private Keys ............................................................................... 175

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Siemens RUGGEDCOM ROX II and is the answer not in the manual?

Siemens RUGGEDCOM ROX II Specifications

General IconGeneral
BrandSiemens
ModelRUGGEDCOM ROX II
CategoryNetwork Hardware
LanguageEnglish

Related product manuals