Security; Security Overview; Network Access Security - Extreme Networks ExtremeWare 7.2e Installation And User Manual

Software version 7.2e
Table of Contents

Advertisement

9

Security

This chapter describes the following topics:
• Security Overview on page 141
• Network Access Security on page 141
— MAC-Based VLANs on page 142
— IP Access Lists (ACLs) on page 142
— Network Login on page 150
• Switch Protection on page 160
— Routing Access Profiles on page 160
— Denial of Service Protection on page 168
• Management Access Security on page 170
— Authenticating Users Using RADIUS or TACACS+ on page 170
— Secure Shell 2 (SSH2) on page 177

Security Overview

Extreme Networks products incorporate a number of features designed to enhance the security of your
network. No one feature can insure security, but by using a number of features in concert, you can
substantially improve the security of your network. The features described in this chapter are part of an
overall approach to network security

Network Access Security

Network access security features control devices accessing your network. In this category are the
following features:
MAC-Based VLANs
IP Access Lists (ACLs)
Network Login
ExtremeWare 7.2e Installation and User Guide
141

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents