Ead Configuration; Introduction To Ead; Typical Network Application Of Ead - 3Com 4500 Configuration Manual

26/50-port
Hide thumbs Also See for 4500:
Table of Contents

Advertisement

None or incorrect RADIUS server IP address is set on the switch — Be sure to set a correct
RADIUS server IP address.
One or all AAA UDP port settings are incorrect — Be sure to set the same UDP port numbers as
those on the RADIUS server.
Symptom 3: The user passes the authentication and gets authorized, but the accounting information
cannot be transmitted to the RADIUS server.
Possible reasons and solutions:
The accounting port number is not properly set — Be sure to set a correct port number for RADIUS
accounting.
The switch requests that both the authentication/authorization server and the accounting server
use the same device (with the same IP address), but in fact they are not resident on the same
device — Be sure to configure the RADIUS servers on the switch according to the actual situation.
3

EAD Configuration

Introduction to EAD

Endpoint Admission Defense (EAD) is an attack defense solution. Using this solution, you can enhance
the active defense capability of network endpoints, prevents viruses and worms from spreading on the
network, and protects the entire network by limiting the access rights of insecure endpoints.
With the cooperation of switch, AAA sever, security policy server and security client, EAD is able to
evaluate the security compliance of network endpoints and dynamically control their access rights.
With EAD, a switch:
Verifies the validity of the session control packets it receives according to the source IP addresses
of the packets: It regards only those packets sourced from authentication or security policy server
as valid.
Dynamically adjusts the VLAN, rate and packet scheduling priority for user terminals according to
session control packets, whereby to control the access rights of users dynamically.

Typical Network Application of EAD

EAD checks the security status of users before they can access the network, and forcibly implements
user access control policies according to the check results. In this way, it can isolate the users that are
not compliant with security standard and force these users to update their virus databases and install
system patches.
Figure 3-1
shows a typical network application of EAD.
3-24

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4500 pwr

Table of Contents