25 security configuration, 1 configuring rs access security, 1 configuring radius – Riverstone Networks WICT1-12 User Manual

Page 547: Security configuration -1, Configuring rs access security -1, Configuring radius -1

Advertising
background image

Riverstone Networks RS Switch Router User Guide Release 8.0 25-1

25 SECURITY CONFIGURATION

The RS provides security features that help control access to the RS and filter traffic going through the RS. Access
to the RS can be controlled by:

Enabling RADIUS

Enabling TACACS

Enabling TACACS+

Password authentication

Secure shell protocol

Traffic filtering on the RS enables:

Layer-2 security filters - Perform filtering on source or destination MAC addresses.

Layer-3/4 Access Control Lists - Perform filtering on source or destination IP address, source
or destination TCP/UDP port, TOS or protocol type for IP traffic. Perform filtering on source
or destination IPX address, or source or destination IPX socket. Perform access control to
services provided on the RS, for example, Telnet server and HTTP server.

Note

Currently, Source Filtering is available on RS WAN cards; however,
application must take place on the entire WAN card.

25.1 CONFIGURING RS ACCESS SECURITY

This section describes the following methods of controlling access to the RS:

RADIUS

TACACS

TACACS+

Passwords

Secure shell

25.1.1

Configuring RADIUS

You can secure login or Enable mode access to the RS by enabling a Remote Authentication Dial-In Service
(RADIUS) client. A RADIUS server responds to the RS RADIUS client to provide authentication.

Advertising