3-6
Security Volume
Table 3-6
Features in the Security volume
Features
Description
AAA
Authentication, Authorization and Accounting (AAA) provide a uniform
framework used for configuring these three security functions to
implement the network security management. This document describes:
z
Introduction to AAA, RADIUS and HWTACACS
z
AAA configuration
z
RADIUS configuration
z
HWTACACS configuration
802.1X
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network
access control protocol that is used as the standard for LAN user access
authentication. This document describes:
z
802.1X overview
z
802.1X configuration
z
802.1X Guest-VLAN configuration
HABP
On an HABP-capable switch, HABP packets can bypass 802.1X
authentication and MAC authentication, allowing communication among
switches in a cluster. This document describes:
z
Introduction to HABP
z
HABP configuration
MAC Authentication
MAC authentication provides a way for authenticating users based on
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document describes:
z
RADIUS-Based MAC Authentication
z
Local MAC Authentication
Port Security
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document describes:
z
Enabling Port Security
z
Setting the Maximum Number of Secure MAC Addresses
z
Setting the Port Security Mode
z
Configuring Port Security Features
z
Configuring Secure MAC Addresses
z
Ignoring Authorization Information from the Server
IP Source Guard
By filtering packets on a per-port basis, IP source guard prevents illegal
packets from traveling through, thus improving the network security. This
document describes:
z
Configuring a Static Binding Entry
z
Configuring Dynamic Binding Function
SSH2.0
SSH ensures secure login to a remote device in a non-secure network
environment. By encryption and strong authentication, it protects the
device against attacks. This document describes:
z
Configuring Asymmetric Keys
z
Configuring the Device as an SSH Server
z
Configuring the Device as an SSH Client
z
Configuring an SFTP Server
z
Configuring an SFTP Client
PKI
The Public Key Infrastructure (PKI) is a hierarchical framework designed
for providing information security through public key technologies and
digital certificates and verifying the identities of the digital certificate
owners. This document describes PKI related configuration.