Unified access security, Overview of security, Chapter 7 – Extreme Networks Summit 300-48 User Manual

Page 83

Advertising
background image

Summit 300-48 Switch Software User Guide

83

7

Unified Access Security

This chapter describes the security features of the Summit 300-48 switch and includes information on
the following topics:

Overview of Security on page 83

User Access Security on page 84

Network Security Policies on page 87

Network Security Policies on page 87

CLI Commands for Security on the Switch on page 89

Overview of Security

The Extreme Unified Access™ Security architecture provides secure access for all wired and wireless
stations within the unified network. You can maintain the network with a single, unified security
policy, provide service to all stations without requiring upgrades, and take advantage of integrated
policy and management capabilities not available in overlay networks or those with “thick” access
points. Unified Access Security provides the following key capabilities:

Consolidated management — Up to 48 wireless ports from a single Summit 300-48 switch, larger
network support with less management overhead

Scalable encryption — ASIC based AES encryption, WPA with TKIP support, and RC4 based WEP
support on the Altitude 300 wireless port

802.1x Authentication — 802.1x authentication (PEAP, EAP-TTLS, EAP-TLS)

The unified structure simplifies security policies without compromising protection and provides the
following benefits:

Single user experience — Same authentication procedures for wired and wireless users

Unified management — Single management platform for wired and wireless networks

Unified configuration — Consistent CLI for wired and wireless functions

Single authentication infrastructure — Single set of policies, RADIUS, and certificate servers

These security features provide protection for users and for the network infrastructure.

Advertising