Enterasys Networks 1H582-xx User Manual

Page of 808
14-1
14
Security Configuration
This chapter describes the Security Configuration set of commands and how to use them.
14.1 OVERVIEW OF SECURITY METHODS
The following security methods are available for controlling which users are allowed to access, 
monitor, and manage the device. 
Login Security Password – used to log in to the CLI via a Telnet connection or local COM port 
connection. For details, refer to 
SNMP – allows access to the Matrix E1 device via a network SNMP management application. 
The level of management access is dependent on the SNMP user or community name and the 
associated access policy. For details, refer to 
.
Host Access Control Authentication (HACA) – authenticates user access of Telnet management, 
console local management and WebView via a central RADIUS Client/Server application. For 
an overview on working with HACA, refer to 
. For details, on using CLI 
commands to configure HACA/RADIUS, refer to 
.
802.1X Port Based Network Access Control using EAPOL (Extensible Authentication Protocol 
Over LANs) - provides a mechanism via a RADIUS server for administrators to securely 
authenticate and grant appropriate access to end user devices directly attached to Matrix E1 
device ports. For an overview on working with 802.1X, refer to 
using CLI commands to configure 802.1X, refer to 
MAC Authentication – provides a mechanism for administrators to securely authenticate source 
MAC addresses and grant appropriate access to end user devices directly attached to Matrix E1 
device ports. For an overview on working with MAC authentication, refer to 
details on using CLI commands to configure MAC authentication, refer to 
.
MAC Locking – locks a port to one or more MAC addresses, preventing connection of 
unauthorized devices via the port. For details, refer to 
.