Eapol-Based Security - Nortel 2000 Using Manual

Business policy switch
Hide thumbs Also See for 2000:
Table of Contents

Advertisement

Specify optional actions to be exercised by your switch if the software detects
a security violation.
The response can be to send a trap, turn on destination address (DA) filtering,
disable the specific port, or any combination of these three options.
The MAC address-based security feature is based on Nortel Networks
BaySecure
LAN Access for Ethernet, a real-time security system that safeguards
Ethernet networks from unauthorized surveillance and intrusion.
For instructions on configuring the MAC address-based security feature, refer to
Chapter 3, Using Web-based Management for the Business Policy Switch 2000
Software Version 1.2, Reference for the Business Policy Switch 2000 Management
Software Version 1.2, and Reference for the Business Policy Switch 2000
Command Line Interface Software Version 1.2.

EAPOL-based security

BPS 2000 software version 1.1 provides support for security based on the
Extensible Authentication Protocol over LAN (EAPOL), which uses the EAP as
described in the IEEE Draft P802.1X to allow you to set up network access
control on internal LANs.
For information on configuring EAPOL-based security using the Console
Interface (CI) menus, refer to Chapter 3. To configure this feature using the
Web-based management system, refer to Using Web-based Management for the
Business Policy Switch 2000 Software Version 1.2. To use Device Manager (DM)
to configure EAPOL-based security, refer to Reference for the Business Policy
Switch 2000 Management Software Version 1.2. And, to configure this feature
using CLI commands, refer to Reference for the Business Policy Switch 2000
Command Line Interface Software Version 1.2. book.
EAP allows the exchange of authentication information between any end station
or server connected to the switch and an authentication server (such as a RADIUS
server). The EAPOL-based security feature operates in conjunction with a
RADIUS-based server to extend the benefits of remote authentication to internal
LAN clients.
Using the Business Policy Switch 2000 Version 1.2
71

Advertisement

Table of Contents
loading

Table of Contents