3com S7906E Guide De Référence

Page de 2327
Security Volume Organization 
Manual Version 
20090615-C-1.01
 
Product Version 
Release 6300 series 
Organization 
The Security Volume is organized as follows: 
Features 
Description 
AAA  
Authentication, Authorization and Accounting (AAA) provide a uniform 
framework used for configuring these three security functions to 
implement the network security management. This document introduces 
the commands for AAA configuration.  
802.1X 
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network 
access control protocol that is used as the standard for LAN user access 
authentication. This document introduces the commands for 802.1X 
configuration. 
MAC Authentication 
MAC authentication provides a way for authenticating users based on 
ports and MAC addresses; it requires no client software to be installed on 
the hosts. This document introduces the commands for MAC 
Authentication configuration. 
Portal 
Portal authentication, as its name implies, helps control access to the 
Internet. This document introduces the commands for Portal 
configuration.  
Port Security 
Port security is a MAC address-based security mechanism for network 
access controlling. It is an extension to the existing 802.1X authentication 
and MAC authentication. This document introduces the commands for 
Port Security configuration. 
IP Source Guard 
By filtering packets on a per-port basis, IP source guard prevents illegal 
packets from traveling through, thus improving the network security. This 
document introduces the commands for IP Source Guard configuration.
SSH2.0 
SSH ensures secure login to a remote device in a non-secure network 
environment. By encryption and strong authentication, it protects the 
device against attacks. This document introduces the commands for 
SSH2.0 configuration. 
ACL 
An ACL is used for identifying traffic based on a series of preset matching 
criteria. This document introduces the commands for ACL configuration.