Unified Access Security; Overview Of Security - Extreme Networks Summit 300-48 Software User's Manual

Software version 6.2a
Hide thumbs Also See for Summit 300-48:
Table of Contents

Advertisement

7

Unified Access Security

This chapter describes the security features of the Summit 300-48 switch and includes information on
the following topics:
• Overview of Security on page 83
• User Access Security on page 84
• Network Security Policies on page 87
• Network Security Policies on page 87
• CLI Commands for Security on the Switch on page 89

Overview of Security

The Extreme Unified Access™ Security architecture provides secure access for all wired and wireless
stations within the unified network. You can maintain the network with a single, unified security
policy, provide service to all stations without requiring upgrades, and take advantage of integrated
policy and management capabilities not available in overlay networks or those with "thick" access
points. Unified Access Security provides the following key capabilities:
• Consolidated management — Up to 48 wireless ports from a single Summit 300-48 switch, larger
network support with less management overhead
• Scalable encryption — ASIC based AES encryption, WPA with TKIP support, and RC4 based WEP
support on the Altitude 300 wireless port
• 802.1x Authentication — 802.1x authentication (PEAP, EAP-TTLS, EAP-TLS)
The unified structure simplifies security policies without compromising protection and provides the
following benefits:
• Single user experience — Same authentication procedures for wired and wireless users
• Unified management — Single management platform for wired and wireless networks
• Unified configuration — Consistent CLI for wired and wireless functions
• Single authentication infrastructure — Single set of policies, RADIUS, and certificate servers
These security features provide protection for users and for the network infrastructure.
Summit 300-48 Switch Software User Guide
83

Advertisement

Table of Contents
loading

Table of Contents