
2-7
Features
Description
Appendix
This document describes:
z
Acronym
z
Default Priority Mapping Tables
z
Introduction to Packet Precedences
Security Volume
Table 2-6
Features in the Security volume
Features
Description
AAA
Authentication, Authorization and Accounting (AAA) provide a uniform
framework used for configuring these three security functions to
implement the network security management. This document describes:
z
Introduction to AAA, RADIUS and HWTACACS
z
AAA configuration
z
RADIUS configuration
z
HWTACACS configuration
802.1X
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network
access control protocol that is used as the standard for LAN user access
authentication. This document describes:
z
802.1X overview
z
802.1X configuration
z
802.1X Guest-VLAN configuration
EAD Fast Deployment
In conjunction with 802.1X, EAD Fast Deployment can have an access
switch to force all attached devices to download and install the EAD client
before permitting them to access the network. This document describes:
z
EAD Fast Deployment overview
z
EAD Fast Deployment configuration
HABP
On an HABP-capable switch, HABP packets can bypass 802.1X
authentication and MAC authentication, allowing communication among
switches in a cluster. This document describes:
z
Introduction to HABP
z
HABP configuration
MAC Authentication
MAC authentication provides a way for authenticating users based on
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document describes:
z
RADIUS-Based MAC Authentication
z
Local MAC Authentication
Port Security
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document describes:
z
Enabling Port Security
z
Setting the Maximum Number of Secure MAC Addresses
z
Setting the Port Security Mode
z
Configuring Port Security Features
z
Configuring Secure MAC Addresses
z
Ignoring Authorization Information from the Server
Summary of Contents for 4210G Series
Page 459: ...4 8...
Page 493: ...12 1...
Page 968: ...19 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found...