Enterasys Networks D2G124-12P Benutzerhandbuch
D-Series CLI Reference 15-1
15
Security Configuration
This chapter describes the Security Configuration set of commands and how to use them.
The following security methods are available for controlling which users are allowed to access,
monitor, and manage the switch.
monitor, and manage the switch.
•
Login user accounts and passwords – used to log in to the CLI via a Telnet connection or local
COM port connection. For details, refer to “
COM port connection. For details, refer to “
•
Host Access Control Authentication (HACA) – authenticates user access of Telnet
management, console local management and WebView via a central RADIUS Client/Server
application. When RADIUS is enabled, this essentially overrides login user accounts. When
HACA is active per a valid RADIUS configuration, the user names and passwords used to
access the switch via Telnet, SSH, WebView, and COM ports will be validated against the
configured RADIUS server. Only in the case of a RADIUS timeout will those credentials be
compared against credentials locally configured on the switch.
management, console local management and WebView via a central RADIUS Client/Server
application. When RADIUS is enabled, this essentially overrides login user accounts. When
HACA is active per a valid RADIUS configuration, the user names and passwords used to
access the switch via Telnet, SSH, WebView, and COM ports will be validated against the
configured RADIUS server. Only in the case of a RADIUS timeout will those credentials be
compared against credentials locally configured on the switch.
For details, refer to
•
SNMP user or community names – allows access to the D‐Series switch via a network SNMP
management application. To access the switch, you must enter an SNMP user or community
name string. The level of management access is dependent on the associated access policy. For
details, refer to
management application. To access the switch, you must enter an SNMP user or community
name string. The level of management access is dependent on the associated access policy. For
details, refer to
.
•
802.1X Port Based Network Access Control using EAPOL (Extensible Authentication
Protocol) – provides a mechanism via a RADIUS server for administrators to securely
authenticate and grant appropriate access to end user devices communicating with D‐Series
Protocol) – provides a mechanism via a RADIUS server for administrators to securely
authenticate and grant appropriate access to end user devices communicating with D‐Series
For information about...
Refer to page...