Locked Port Support - Dell PowerConnect 5424 User Manual

Powerconnect 5400 series
Hide thumbs Also See for PowerConnect 5424:
Table of Contents

Advertisement

Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via an external server.
Only authenticated and approved system users can transmit and receive data. Ports are authenticated via
the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication
Protocol (EAP). Dynamic VLAN Assignment (DVA) allows network administrators to automatically
assign users to VLANs during the RADIUS server authentication.
For more information, see "Configuring Port Based Authentication" on page 243.

Locked Port Support

Locked Port increases network security by limiting access on a specific port only to users with specific
MAC addresses. These addresses are either manually defined or learned on that port. When a frame is
seen on a locked port, and the frame source MAC address is not tied to that port, the protection
mechanism is invoked.
For more information, see "Configuring Port Security" on page 252.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user database, which contains
per-user authentication information, such as user name, password and accounting information.
For more information, see "Configuring RADIUS Global Parameters" on page 176.
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH version 1 is
currently available. The SSH server feature enables an SSH client to establish a secure, encrypted
connection with a device. This connection provides functionality that is similar to an inbound telnet
connection. SSH uses RSA Public Key cryptography for device connections and authentication.
TACACS+
TACACS+ provides centralized security for validation of users accessing the device. TACACS+ provides
a centralized user management system, while still retaining consistency with RADIUS and other
authentication processes.
For more information, see "Defining TACACS+ Settings" on page 171.
Access Control Lists (ACL)
Access Control Lists (ACL) allow network managers to define classification actions and rules for specific
ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry
and the ingress port is disabled. If they are denied entry, the user can disable the port.
For more information, see "ACL Overview" on page 256.
22
Introduction

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Powerconnect 5448

Table of Contents