20
Introduction
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via an external server. Only
authenticated and approved system users can transmit and receive data. Ports are authenticated via the
Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication Protocol
(EAP).
For more information, see "Configuring Port Based Authentication" on page 216.
Locked Port Support
Locked Port increases network security by limiting access on a specific port only to users with specific
MAC addresses. These addresses are either manually defined or learned on that port. When a frame is seen
on a locked port, and the frame source MAC address is not tied to that port, the protection mechanism is
invoked.
For more information, see "Configuring Port Security" on page 224.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user database, which contains per-
user authentication information, such as user name, password and accounting information.
For more information, see "Configuring RADIUS Global Parameters" on page 155.
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH version 1 is
currently available. The SSH server feature enables an SSH client to establish a secure, encrypted
connection with a device. This connection provides functionality that is similar to an inbound telnet
connection. SSH uses RSA Public Key cryptography for device connections and authentication.
provides centralized security for validation of users accessing the device. provides a
centralized user management system, while still retaining consistency with RADIUS and other
authentication processes.
For more information, see "Defining Settings" on page 150.
Access Control Lists (ACL)
Access Control Lists
(ACL) allow network managers to define classification actions and rules for specific
ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and
the ingress port is disabled. If they are denied entry, the user can disable the port.
For more information, see "ACL Overview" on page 227.
Summary of Contents for PowerConnect 54 Series
Page 1: ...w w w d e l l c o m s u p p o r t d e l l c o m Dell PowerConnect 54xx Systems User Guide ...
Page 22: ...22 Introduction ...
Page 64: ...64 Using Dell OpenManage Switch Administrator ...
Page 214: ...214 Configuring System Information ...
Page 343: ...Configuring Device Information 343 ...
Page 344: ...344 Configuring Device Information ...
Page 381: ...Viewing Statistics 381 ...
Page 382: ...382 Viewing Statistics ...