3com S7906E Guide De Référence
Security Volume Organization
Manual Version
20090615-C-1.01
Product Version
Release 6300 series
Organization
The Security Volume is organized as follows:
Features
Description
AAA
Authentication, Authorization and Accounting (AAA) provide a uniform
framework used for configuring these three security functions to
implement the network security management. This document introduces
the commands for AAA configuration.
framework used for configuring these three security functions to
implement the network security management. This document introduces
the commands for AAA configuration.
802.1X
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network
access control protocol that is used as the standard for LAN user access
authentication. This document introduces the commands for 802.1X
configuration.
access control protocol that is used as the standard for LAN user access
authentication. This document introduces the commands for 802.1X
configuration.
MAC Authentication
MAC authentication provides a way for authenticating users based on
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document introduces the commands for MAC
Authentication configuration.
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document introduces the commands for MAC
Authentication configuration.
Portal
Portal authentication, as its name implies, helps control access to the
Internet. This document introduces the commands for Portal
configuration.
Internet. This document introduces the commands for Portal
configuration.
Port Security
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document introduces the commands for
Port Security configuration.
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document introduces the commands for
Port Security configuration.
IP Source Guard
By filtering packets on a per-port basis, IP source guard prevents illegal
packets from traveling through, thus improving the network security. This
document introduces the commands for IP Source Guard configuration.
packets from traveling through, thus improving the network security. This
document introduces the commands for IP Source Guard configuration.
SSH2.0
SSH ensures secure login to a remote device in a non-secure network
environment. By encryption and strong authentication, it protects the
device against attacks. This document introduces the commands for
SSH2.0 configuration.
environment. By encryption and strong authentication, it protects the
device against attacks. This document introduces the commands for
SSH2.0 configuration.
ACL
An ACL is used for identifying traffic based on a series of preset matching
criteria. This document introduces the commands for ACL configuration.
criteria. This document introduces the commands for ACL configuration.