Allied Telesis AT-S63 User Manual

Page 10

Advertising
background image

Contents

10

Section VIII: Port Security ..................................................................................... 413

Chapter 35: MAC Address-based Port Security ........................................................................................ 415
Supported Platforms ....................................................................................................................................... 416
Overview ......................................................................................................................................................... 417

Automatic.................................................................................................................................................. 417
Limited ...................................................................................................................................................... 417
Secured .................................................................................................................................................... 418
Locked ...................................................................................................................................................... 418

Invalid Frames and Intrusion Actions .............................................................................................................. 419
Guidelines ....................................................................................................................................................... 420

Chapter 36: 802.1x Port-based Network Access Control ......................................................................... 421
Supported Platforms ....................................................................................................................................... 422
Overview ......................................................................................................................................................... 423
Authentication Process ................................................................................................................................... 425
Port Roles ....................................................................................................................................................... 426

None Role................................................................................................................................................. 426
Authenticator Role .................................................................................................................................... 426
Supplicant Role ........................................................................................................................................ 428

Authenticator Ports with Single and Multiple Supplicants ............................................................................... 429

Single Operating Mode............................................................................................................................. 429
Multiple Operating Mode .......................................................................................................................... 433

Supplicant and VLAN Associations................................................................................................................. 436

Single Operating Mode............................................................................................................................. 437
Multiple Operating Mode .......................................................................................................................... 437
Supplicant VLAN Attributes on the RADIUS Server ................................................................................. 437

Guest VLAN .................................................................................................................................................... 438
RADIUS Accounting........................................................................................................................................ 439
General Steps ................................................................................................................................................. 440
Guidelines ....................................................................................................................................................... 441

Section IX: Management Security ......................................................................... 445

Chapter 37: Web Server .............................................................................................................................. 447
Supported Platforms ....................................................................................................................................... 448
Overview ......................................................................................................................................................... 449

Supported Protocols ................................................................................................................................. 449

Configuring the Web Server for HTTP ............................................................................................................ 450
Configuring the Web Server for HTTPS.......................................................................................................... 451

General Steps for a Self-signed Certificate .............................................................................................. 451
General Steps for a Public or Private CA Certificate ................................................................................ 451

Chapter 38: Encryption Keys ...................................................................................................................... 453
Supported Platforms ....................................................................................................................................... 454
Overview ......................................................................................................................................................... 455
Encryption Key Length .................................................................................................................................... 456
Encryption Key Guidelines .............................................................................................................................. 457
Technical Overview......................................................................................................................................... 458

Data Encryption ........................................................................................................................................ 458
Data Authentication .................................................................................................................................. 460
Key Exchange Algorithms ........................................................................................................................ 461

Advertising