Siemens RUGGEDCOM ROX II User Manual page 12

Hide thumbs Also See for RUGGEDCOM ROX II:
Table of Contents

Advertisement

 
Table of Contents
6.3  Enabling/Disabling Brute Force Attack Protection ......................................................................... 127
6.4  Enabling/Disabling Compact Flash Card Removal Detection .......................................................... 128
6.5  Enabling/Disabling SYN Cookies ................................................................................................. 129
6.6  Managing Port Security ............................................................................................................. 129
6.6.1  Port Security Concepts .................................................................................................... 130
6.6.1.1  Static MAC Address-Based Authentication .............................................................. 130
6.6.1.2  IEEE 802.1x Authentication .................................................................................. 130
6.6.1.3  IEEE 802.1X Authentication with MAC Address-Based Authentication ....................... 131
6.6.1.4  Assigning VLANS with Tunnel Attributes ................................................................ 132
6.6.2  Configuring Port Security ................................................................................................ 132
6.6.3  Viewing the Security Status of Switched Ethernet Ports ..................................................... 134
6.7  Managing User Authentication ................................................................................................... 134
6.7.1  Setting the User Authentication Mode ............................................................................. 135
6.7.2  Managing User Authentication Keys ................................................................................ 135
6.7.2.1  Determining Which Keys are Associated to a User .................................................. 136
6.7.2.2  Adding a User Authentication Key ........................................................................ 136
6.7.2.3  Deleting a User Authentication Key ....................................................................... 137
6.7.2.4  Associating/Disassociating a User Authentication Key ............................................. 137
6.7.3  Managing RADIUS Authentication .................................................................................... 138
6.7.3.1  Configuring RADIUS Authentication for LOGIN Services ........................................... 139
6.7.3.2  Configuring RADIUS Authentication for PPP Services ............................................... 140
6.7.3.3  Configuring RADIUS Authentication for Switched Ethernet Ports .............................. 141
6.7.4  Configuring TACACS+ Authentication ............................................................................... 141
6.8  Managing Certificates and Keys ................................................................................................. 143
6.8.1  Viewing the Local Host SSH/RSA Public Key ...................................................................... 143
6.8.2  Managing the Trusted Certificate Store ............................................................................ 144
6.8.2.1  Configuring the Trusted Certificate Store ............................................................... 144
6.8.2.2  Enabling/Disabling the Trusted Certificate Store ..................................................... 144
6.8.2.3  List of Root Certificates in the Trusted Certificate Store ........................................... 145
6.8.3  Managing CA Certificates for the Trusted Certificate Store ................................................. 171
6.8.3.1  Viewing a List of CA Certificates Added to the Trusted Certificate Store ..................... 171
6.8.3.2  Adding a CA Certificate to the Trusted Certificate Store ........................................... 171
6.8.3.3  Deleting a CA Certificate from the Trusted Certificate Store ..................................... 172
6.8.4  Managing CA Certificates and CRLs .................................................................................. 172
6.8.4.1  Viewing a List of CA Certificates and CRLs ............................................................. 172
6.8.4.2  Viewing the Status of a CA Certificate and CRL ...................................................... 172
6.8.4.3  Adding a CA Certificate and CRL ........................................................................... 174
6.8.4.4  Deleting a CA Certificate and CRL ......................................................................... 175
6.8.5  Managing Private Keys ................................................................................................... 175
6.8.5.1  Viewing a List of Private Keys ............................................................................... 175
xii
RUGGEDCOM ROX II
CLI User Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents