Configuring Network Security
53
Configuring Network
Security
The Network Security section provides links that enable you to configure
Port-based authentication, port security, storm control and EAP statistics.
This section includes the following:
■
Port-based Authentication
■
Advanced Port-based Authentication
■
Managing Port Security
■
Enabling Storm Control
■
Configuring EAP Statistics
■
Binding ACLs
Port-based
Authentication
Port-based authentication authenticates users on a per-port basis via an
external server. Only authenticated and approved system users can
transmit and receive data. Ports are authenticated via the RADIUS server
using the
Extensible Authentication Protocol
(EAP). Port-based
authentication includes:
■
Authenticators
— Specifies the device port which is authenticated
before permitting system access.
■
Supplicants
— Specifies the host connected to the authenticated
port requesting to access the system services.
■
Authentication Server
— Specifies the server that performs the
authentication on behalf of the authenticator, and indicates whether
the supplicant is authorized to access system services.
Port-based authentication creates two access states:
■
Controlled Access
— Permits communication between the
supplicant and the system, if the supplicant is authorized.
■
Uncontrolled Access
— Permits uncontrolled communication
regardless of the port state.
Summary of Contents for 3CRUS2475 24
Page 137: ...Defining LAG Membership 137...
Page 139: ...139 Defining Voice VLAN Defining GVRP...
Page 194: ...194 CHAPTER 9 CONFIGURING IP INFORMATION Static Indicates the ARP entry is a static entry...
Page 197: ...Defining ARP Interface Settings 197 Unchecked Maintains the current ARP entries...
Page 321: ...320 APPENDIX C TROUBLESHOOTING...
Page 329: ...328 APPENDIX GLOSSARY...