Overview Of Security Methods - Enterasys N Standalone (NSA) Series Configuration Manual

Enterasys networks switch configuration guide
Table of Contents

Advertisement

This chapter describes the Security Configuration set of commands and how to use them.

14.1 OVERVIEW OF SECURITY METHODS

The following security methods are available for controlling which users are allowed to access,
monitor, and manage the device.
Local user credentials — used for local authentication and authorization of CLI and WebView
management sessions. For details, refer to
Remote AAA service — used for remote authentication, authorization, and accounting of CLI
and WebView management sessions, as well as all network access sessions provisioned by way
of 802.1x, PWA, or MAC Authentication. For details, refer to
Support for RADUIS, RFC 3580, and TACACS+ can be found in the following sections:
Section
14.3.2,
Section
SNMP user or community names — used for authentication and authorization of all SNMP
requests. For details, refer to
802.1X Network Access Control — used for controlling access to network resources on a per
port, per user, or per end station basis. For more details, refer to
Port Web Authentication (PWA) — used for controlling access to network resources on a per
user basis via HTTP. For details, refer to
MAC Authentication — used for controlling access to network resources on a per MAC address
basis. For details, refer to
Convergence End Point (CEP) — Convergence Endpoint (CEP) detection is an Enterasys
Networks mechanism for identifying IP phones that are connected to a given switch. When an
endpoint is discovered, a policy is then assigned to the endpoint. For details, refer to
Section 14.3.8
Section 2.2.1
14.3.3, and
Section 14.3.4
Chapter
5.
Section
Section
14.3.7.
Security Configuration
and
Section
Section 14.3.1
14.3.6.
Matrix NSA Series Configuration Guide
14
14.3.1.
and
Section
Section
14.3.5.
14.3.5.
14-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Matrix n standalone series

Table of Contents