Overview Of Security Methods - Enterasys SmartSwitch 6000 User Manual

Local management
Hide thumbs Also See for SmartSwitch 6000:
Table of Contents

Advertisement

Table 3-3 Module Menu Screen Menu Item Descriptions (Continued)
Menu Item
SECURITY
(cont'd)
3.6

OVERVIEW OF SECURITY METHODS

Six security methods are available to control which users are allowed to access, monitor, and
control the switch module.
Login Security Password – used to access the Module Menu screen to start a Local Management
session via a Telnet connection or local COM port connection. Whenever a connection is made
to the switch module, the Local Management Password screen displays. Before continuing, you
must enter a login password, which is compared to the stored passwords and associated
management level access policies configured using the Security screen described in
SNMP Community String – allows access to the switch module via a network SNMP
management application. To access the switch module, you must enter an SNMP Community
Name string. The level of management access is dependent on the SNMP Community Name and
the associated Access Policy configured in the SNMP Community Names Configuration screen
described in
Section
NOTE: You can set the same string as a Security login password and SNMP
Community Name. This allows you to access and manage the switch module whether
you are starting a Local Management session via a Telnet connection or local COM port
connection, or using a network SNMP management application.
If the login security password is different from the SNMP Community Name, the two
cannot be used interchangeably to access the switch module.
Screen Function
The MAC Port Configuration screen enables you to monitor the
authentication state of the supplicants associated with each port and
enable/disable, initialize, and force a revalidation of the port MAC
credential.
For more information about MAC port configuration, refer to
Section
3.14.
The MAC Supplicant Configuration screen enables you to see which
MAC authentication supplicants are active, their MAC address and
associated module ports, and enable you to initialize or reauthenticate
each of the supplicants.
For more information about the MAC Supplicant Configuration screen,
refer to
Section
3.15.
4.4.
Overview of Security Methods
Accessing Local Management
Section
3.7.
3-15

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents