Enterasys SmartSwitch 6000 User Manual page 8

Local management
Hide thumbs Also See for SmartSwitch 6000:
Table of Contents

Advertisement

3.4
Module Selection Screen ................................................................................ 3-9
3.4.1
3.5
Module Menu Screen .................................................................................... 3-12
3.6
Overview of Security Methods ...................................................................... 3-15
3.6.1
3.6.2
3.6.3
3.6.4
3.7
Security Menu Screen................................................................................... 3-26
3.8
Passwords Screen ........................................................................................ 3-29
3.8.1
3.9
Radius Configuration Screen ........................................................................ 3-31
3.9.1
3.9.2
3.10
Name Services Configuration Screen ........................................................... 3-35
3.11
System Authentication Configuration Screen................................................ 3-37
3.12
EAP (Port) Configuration Screen .................................................................. 3-39
3.13
EAP Statistics Menu Screen ......................................................................... 3-44
3.13.1
3.13.2
3.13.3
3.14
MAC Port Configuration Screen.................................................................... 3-54
3.15
MAC Supplicant Configuration Screen.......................................................... 3-56
4
4.1
Chassis Menu Screen ..................................................................................... 4-2
4.2
Chassis Configuration Screen......................................................................... 4-4
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.3
SNMP Configuration Menu Screen ............................................................... 4-10
4.4
SNMP Community Names Configuration Screen ......................................... 4-12
4.4.1
4.5
SNMP Traps Configuration Screen............................................................... 4-14
4.5.1
vi
Contents
Selecting a Module ....................................................................... 3-11
Host Access Control Authentication (HACA) ................................ 3-16
802.1X Port Based Network Access Control ................................ 3-19
3.6.2.1
Definitions of Terms and Abbreviations......................... 3-19
3.6.2.2
802.1X Security Overview ............................................. 3-20
MAC Authentication Overview ...................................................... 3-21
3.6.3.1
Authentication Method Selection................................... 3-21
3.6.3.2
Authentication Method Sequence ................................. 3-21
3.6.3.3
Authentication................................................................ 3-21
MAC Authentication Control.......................................................... 3-25
Setting the Module Login Password ............................................. 3-31
Setting the Last Resort Authentication.......................................... 3-34
Setting the Local and Remote Servers ......................................... 3-34
EAP Session Statistics Screen ..................................................... 3-46
EAP Authenticator Statistics Screen............................................. 3-48
EAP Diagnostic Statistics Screen ................................................. 3-51
Setting the IP Address .................................................................... 4-6
Setting the Subnet Mask................................................................. 4-7
Setting the Chassis Date ................................................................ 4-7
Setting the Chassis Time ................................................................ 4-8
Setting a New Screen Refresh Time............................................... 4-8
Setting the Screen Lockout Time.................................................... 4-9
Establishing Community Names ................................................... 4-13
Configuring the Trap Table ........................................................... 4-16

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents