Manualsbrain.com
es
English
Deutsch
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuales
Marcas
Cisco
Cisco Identity Services Engine Software
Prospecto
Cisco Cisco Identity Services Engine Software Prospecto
Descargar
Me gusta
Pantalla completa
Estándar
Página
de
14
ir
© 2015 思科系统公司
第
2
页
安全访问操作指南
目录
从监控模式迁移
........................................................................................................................................................... 3
从监控模式转至低影响模式
............................................................................................................... 3
使用分阶段方法
.................................................................................................................................... 3
一次迁移一台交换机
..................................................................................................................... 3
转至低影响模式
.............................................................................................................................. 5
阶段
1 .......................................................................................................................................... 5
登录速度慢
................................................................................................................................ 6
更改默认端口
ACL ................................................................................................................................. 7
阶段
2 .......................................................................................................................................... 7
有线访问
-802.1X 和 MAB 身份验证 .............................................................................................. 7
检查其他用户信息
................................................................................................................................ 7
角色特定访问权限的配置
................................................................................................................... 8
封闭模式(以前称为高安全性模式)
..................................................................................... 13
附录
A
:参考
.............................................................................................................................................................. 14
TrustSec 系统: ..................................................................................................................................... 14
设备配置指南:
.................................................................................................................................. 14
Anterior
Siguiente
1
2
3
4
…
14