Configuration Rules; Radius-Based Security - Nortel BayStack 450-24T Using Manual

Baystack 450 10/100/1000 series switch
Hide thumbs Also See for BayStack 450-24T:
Table of Contents

Advertisement

Using the BayStack 450 10/100/1000 Series Switch
You must also specify the Microsoft 2001 IAS server (or any generic RADIUS
server that supports EAP) as the primary RADIUS server for these devices.
You can manage network access to your switch or stack using the CI menus and
screens as described in Chapter 3, "Using the Console Interface," or you can use
the Optivity SecureLAN application (refer to Managing Network Access with
Optivity SecureLAN [Part number 312688-A]).

Configuration Rules

The following configuration rules apply to your BayStack 450 switch when using
EAPOL-based security:

RADIUS-Based Security

The RADIUS-based security feature allows you to set up network access control,
using the RADIUS (Remote Authentication Dial-In User Services) security
protocol.
The feature uses the RADIUS protocol to authenticate local console, TELNET,
and EAPOL-authorized logins.
You must set up specific user accounts (user names and passwords, and
Service-Type attributes) on your RADIUS server before the authentication
process can be initiated.
1-28
Before configuring your switch, you must configure the Primary RADIUS
Server and Shared Secret fields (see "Console/Comm Port Configuration" on
page 3-100).
You cannot configure EAPOL-based security on ports that are currently
configured for:
-- MultiLink Trunking
-- MAC address-based security
-- IGMP (Static Router Ports)
-- ATM
-- Port mirroring
You can connect a single client only on each port that is configured for
EAPOL-based security.
309978-D Rev 01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Baystack 450-12fBaystack 450-12t

Table of Contents