Allied Telesis AT-S63 User Manual

Page 12

Advertising
background image

Contents

12

Deleting a Certificate ....................................................................................................................................................................................... 594
Viewing a Certificate ........................................................................................................................................................................................ 596
Generating an Enrollment Request ............................................................................................................................................................ 599
Installing CA Certificates onto a Switch .................................................................................................................................................... 602
Viewing or Configuring the Number of Certificates in the Database ............................................................................................ 603
Configuring SSL ................................................................................................................................................................................................. 604

Chapter 28
Secure Shell (SSH)
........................................................................................................................................................................................... 607
SSH Overview ..................................................................................................................................................................................................... 608

Support for SSH ........................................................................................................................................................................................ 608
SSH Server .................................................................................................................................................................................................. 609
SSH Clients ................................................................................................................................................................................................. 609
SSH and Enhanced Stacking ................................................................................................................................................................ 610
SSH Configuration Guidelines ............................................................................................................................................................ 611
General Steps for Configuring SSH ................................................................................................................................................... 611

Configuring SSH ................................................................................................................................................................................................ 613
Displaying SSH Information .......................................................................................................................................................................... 616

Chapter 29
802.1x Port-based Network Access Control
...................................................................................................................................... 619
IEEE 802.1x Port-based Network Access Control Overview ............................................................................................................... 620

Authentication Process ......................................................................................................................................................................... 621
Port Roles .................................................................................................................................................................................................... 622

None Role ........................................................................................................................................................................................... 622
Authenticator Role .......................................................................................................................................................................... 622
Supplicant Role ................................................................................................................................................................................. 623

RADIUS Accounting ................................................................................................................................................................................ 624
General Steps ............................................................................................................................................................................................ 625
Port-based Network Access Control Guidelines .......................................................................................................................... 626

Setting Port Roles .............................................................................................................................................................................................. 629
Enabling or Disabling 802.1x Port-based Network Access Control ................................................................................................ 631
Configuring Authenticator Port Parameters ........................................................................................................................................... 632
Configuring Supplicant Port Parameters ................................................................................................................................................. 636
Displaying the Port Access Parameters ..................................................................................................................................................... 639
Configuring RADIUS Accounting ................................................................................................................................................................ 641

Chapter 30
TACACS+ and RADIUS Protocols
............................................................................................................................................................. 644
TACACS+ and RADIUS Overview ................................................................................................................................................................. 645

TACACS+ and RADIUS Implementation Guidelines ................................................................................................................... 646

Enabling or Disabling TACACS+ or RADIUS ............................................................................................................................................ 648

Enabling TACACS+ or RADIUS ............................................................................................................................................................ 648
Disabling TACACS+ or RADIUS ........................................................................................................................................................... 649

Configuring TACACS+ ..................................................................................................................................................................................... 650
Displaying the TACACS+ Settings ............................................................................................................................................................... 652
Configuring RADIUS ......................................................................................................................................................................................... 654
Displaying RADIUS Status and Settings .................................................................................................................................................... 656

Chapter 31
Denial of Service Defense
........................................................................................................................................................................... 659
Denial of Service Overview ............................................................................................................................................................................ 660

SYN Flood Attack ..................................................................................................................................................................................... 660
SMURF Attack ........................................................................................................................................................................................... 661
Land Attack ................................................................................................................................................................................................ 661
Teardrop Attack ....................................................................................................................................................................................... 662
Ping of Death Attack .............................................................................................................................................................................. 663

Advertising