Security configuration – Enterasys Networks 1G58x-09 User Manual

Page 23

Advertising
background image

Contents

Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide

xxi

14

SECURITY CONFIGURATION

14.1

Overview of Security Methods ...................................................................... 14-1

14.2

Process Overview: Security Configuration.................................................... 14-2

14.3

Security Configuration Command Set........................................................... 14-3
14.3.1

Configuring RADIUS ..................................................................... 14-3
14.3.1.1

show radius ............................................................... 14-4

14.3.1.2

set radius ................................................................... 14-6

14.3.1.3

clear radius ................................................................ 14-8

14.3.1.4

show radius accounting ........................................... 14-10

14.3.1.5

set radius accounting............................................... 14-12

14.3.1.6

clear radius accounting............................................ 14-14

14.3.2

Configuring 802.1X Authentication ............................................. 14-15
14.3.2.1

show dot1x .............................................................. 14-16

14.3.2.2

show dot1x auth-config............................................ 14-19

14.3.2.3

set dot1x .................................................................. 14-20

14.3.2.4

set dot1x auth-config ............................................... 14-21

14.3.2.5

set dot1x port........................................................... 14-23

14.3.2.6

clear dot1x auth-config ............................................ 14-24

14.3.2.7

show eapol .............................................................. 14-25

14.3.2.8

set eapol .................................................................. 14-29

14.3.3

Configuring MAC Authentication................................................. 14-30
14.3.3.1

show macauthentication .......................................... 14-31

14.3.3.2

show macauthentication session............................. 14-34

14.3.3.3

set macauthentication.............................................. 14-35

14.3.3.4

set macauthentication password ............................. 14-36

14.3.3.5

set macauthentication port ...................................... 14-37

14.3.3.6

set macauthentication portinitialize.......................... 14-38

14.3.3.7

set macauthentication macinitialize ......................... 14-38

14.3.3.8

set macauthentication reauthentication ................... 14-39

14.3.3.9

set macauthentication portreauthenticate................ 14-40

14.3.3.10

set macauthentication macreauthenticate ............... 14-40

14.3.3.11

set macauthentication reauthperiod ........................ 14-41

14.3.3.12

set macauthentication quietperiod........................... 14-42

14.3.4

Configuring MAC Locking ........................................................... 14-43
14.3.4.1

show maclock .......................................................... 14-44

14.3.4.2

show maclock stations............................................. 14-46

14.3.4.3

set maclock enable.................................................. 14-48

14.3.4.4

set maclock disable ................................................. 14-49

14.3.4.5

set maclock.............................................................. 14-50

14.3.4.6

set maclock firstarrival ............................................. 14-51

14.3.4.7

set maclock static .................................................... 14-52

14.3.4.8

set maclock move.................................................... 14-53

Advertising
This manual is related to the following products: