Enterasys SecureStack A2 A2H124-48P Especificaciones Pagina 464

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 634
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 463
Process Overview: Security Configuration
10-2 SecureStack A2 Configuration Guide
MAC Authentication – provides a mechanism for administrators to securely authenticate source
MAC addresses and grant appropriate access to end user devices communicating on SecureStack
A2 ports. For details, refer to Section 10.3.3.
Multiple Authentication Methods – allows users to authenticate using multiple methods of
authentication on the same port. For details, refer to Section 10.3.4.
RFC 3580 Tunnel Attributes provide a mechanism to contain an 802.1X authenticated user to a
VLAN regardless of the PVID, refer to Section 10.3.5.
MAC Locking – locks a port to one or more MAC addresses, preventing the use of unauthorized
devices and MAC spoofing on the port. For details, refer to Section 10.3.6.
Secure Shell (SSH) – provides secure Telnet. For details, refer to Section 10.3.7.
10.2 PROCESS OVERVIEW: SECURITY CONFIGURATION
Use the following steps as a guide to configuring security methods on the device:
1. Configuring RADIUS (Section 10.3.1)
2. Configuring 802.1X Authentication (Section 10.3.2)
3. Configuring MAC Authentication (Section 10.3.3)
4. Configuring multiple authentication methods (Section 10.3.4)
5. Configuring RFC 3580 RADIUS tunnel attributes (Section 10.3.5)
6. Configuring MAC Locking (Section 10.3.6)
7. Configuring Secure Shell (SSH) (Section 10.3.7)
Vista de pagina 463
1 2 ... 459 460 461 462 463 464 465 466 467 468 469 ... 633 634

Comentarios a estos manuales

Sin comentarios