H3C LS-3100-52P-OVS-H3 Operation Manual page 19

S5500-ei series ethernet switches
Table of Contents

Advertisement

Features
802.1x
HABP
MAC Authentication
Portal
Port Security
IP Source Guard
SSH2.0
PKI
SSL
Public Key
IEEE 802.1x (hereinafter simplified as 802.1x) is a port-based network
access control protocol that is used as the standard for LAN user access
authentication. This document describes:
802.1x overview
802.1x configuration
802.1x Guest-VLAN configuration
On an HABP-capable switch, HABP packets can bypass 802.1x
authentication and MAC authentication, allowing communication among
switches in a cluster. This document describes:
Introduction to HABP
HABP configuration
MAC authentication provides a way for authenticating users based on
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document describes:
RADIUS-Based MAC Authentication
Local MAC Authentication
Portal authentication, as its name implies, helps control access to the
Internet. This document describes:
Portal overview
Portal configuration
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1x authentication
and MAC authentication. This document describes:
Enabling Port Security
Setting the Maximum Number of Secure MAC Addresses
Setting the Port Security Mode
Configuring Port Security Features
Configuring Secure MAC Addresses
Ignoring Authorization Information from the Server
By filtering packets on a per-port basis, IP source guard prevents illegal
packets from traveling through, thus improving the network security. This
document describes:
Configuring a Static Binding Entry
Configuring Dynamic Binding Function
SSH ensures secure login to a remote device in a non-secure network
environment. By encryption and strong authentication, it protects the
device against attacks. This document describes:
Configuring Asymmetric Keys
Configuring the Device as an SSH Server
Configuring the Device as an SSH Client
Configuring an SFTP Server
Configuring an SFTP Client
The Public Key Infrastructure (PKI) is a hierarchical framework designed
for providing information security through public key technologies and
digital certificates and verifying the identities of the digital certificate
owners. This document describes PKI related configuration.
Secure Sockets Layer (SSL) is a security protocol providing secure
connection service for TCP-based application layer protocols, this
document describes SSL related configuration.
This document describes Public Key Configuration.
3-10
Description

Advertisement

Chapters

Table of Contents
loading

Table of Contents