Security configuration, 1 overview of security methods, Overview of security methods -1 – Enterasys Networks 1G58x-09 User Manual

Page 683: Chapter 14

Advertising
background image

Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide

14-1

14

Security Configuration

This chapter describes the Security Configuration set of commands and how to use them.

14.1 OVERVIEW OF SECURITY METHODS

The following security methods are available for controlling which users are allowed to access,
monitor, and manage the device.

Login Security Password – used to log in to the CLI via a Telnet connection or local COM port
connection. For details, refer to

Section 3.2.1

.

SNMP – allows access to the Matrix E1 device via a network SNMP management application.
The level of management access is dependent on the SNMP user or community name and the
associated access policy. For details, refer to

Chapter 5

.

Host Access Control Authentication (HACA) – authenticates user access of Telnet management,
console local management and WebView via a central RADIUS Client/Server application. For
an overview on working with HACA, refer to

Section 14.4.1

. For details, on using CLI

commands to configure HACA/RADIUS, refer to

Section 14.3.1

.

802.1X Port Based Network Access Control using EAPOL (Extensible Authentication Protocol
Over LANs) - provides a mechanism via a RADIUS server for administrators to securely
authenticate and grant appropriate access to end user devices directly attached to Matrix E1
device ports. For an overview on working with 802.1X, refer to

Section 14.4.2

. For details on

using CLI commands to configure 802.1X, refer to

Section 14.3.2

.

MAC Authentication – provides a mechanism for administrators to securely authenticate source
MAC addresses and grant appropriate access to end user devices directly attached to Matrix E1
device ports. For an overview on working with MAC authentication, refer to

Section 14.4.3

. For

details on using CLI commands to configure MAC authentication, refer to

Section 14.3.3

.

MAC Locking – locks a port to one or more MAC addresses, preventing connection of
unauthorized devices via the port. For details, refer to

Section 14.3.4

.

Advertising
This manual is related to the following products: