Extreme Networks ExtremeWare Command Reference Manual page 848

Version 7.7
Hide thumbs Also See for ExtremeWare:
Table of Contents

Advertisement

Security Commands
policy and management capabilities not available in overlay networks or those with "thick" access
points. Unified Access Security provides the following capabilities:
• Consolidated management—greater network support with reduced management overhead
• Scalable encryption—ASIC based AES encryption, WPA with TKIP support, and RC4 based WEP
support on the Altitude 300 wireless port
• 802.1x Authentication—802.1x authentication (PEAP, EAP-TTLS, EAP-TLS)
• Web-based network login—http and https based user authentication
The unified structure simplifies security policies without compromising protection and provides the
following benefits:
• Single user experience—Same authentication procedures for wired and wireless users
• Unified management—Single management platform for wired and wireless networks
• Unified configuration—Consistent CLI for wired and wireless functions
• Single authentication infrastructure—Single set of policies, RADIUS, and certificate servers
848
ExtremeWare 7.7 Command Reference Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware 7.7

Table of Contents