4
M
ANAGING
The Management Security section provides information for configuring
system access, defining RADIUS authentication, port-based
authentication, and access control lists.
This section includes the following topics:
Configuring System Access
■
Defining RADIUS Clients
■
Defining Port-Based Authentication (802.1X)
■
Defining Local Database Authentication
■
Encrypting Connection to the Web Interface (HTTPS)
■
Using the Secure Shell Protocol (SSH)
■
Defining Access Control Lists
■
Using Broadcast Storm Control
■
D
S
EVICE
ECURITY