Security - Nortel business policy switch 2000 User Manual

Table of Contents

Advertisement

2.0. To use Device Manager (DM) to configure VLANs, refer to Reference for the
Business Policy Switch 2000 Management Software Version 2.0. And, to configure
this feature using CLI commands, refer to Reference for the Business Policy
Switch 2000 Command Line Interface Software Version 2.0.

Security

The Business Policy Switch security features provide three levels of security for
your local area network (LAN):
RADIUS-based security—limits administrative access to the switch through
user authentication
MAC address-based security— limits access to the switch based on allowed
source MAC addresses (and allowed destination MAC addresses, beginning
with software version 2.0)
EAPOL-based security—allows the exchange of authentication information
between any end station or server connected to the switch and authentication
server (such as a RADIUS server)
Figure 7
shows a typical campus configuration using the RADIUS-based and
MAC address-based security features for the Business Policy Switch. This
example assumes that the switch, the teachers' offices and classrooms, and the
library are physically secured. The student dormitory may (or may not be)
physically secure.
Using the Business Policy Switch 2000 Version 2.0
75

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents