178
Controlling Management Access
What Other Features Use Authentication?
In addition to controlling access to the management interface, the switch can
use RADIUS, IAS, or the local user database to provide port-based access
control. Port-based access control specifies whether devices that are
connected to the switch ports are allowed access to the network.
The IEEE 802.1X feature (also known as Dot1X) and Captive Portal feature
use RADIUS or the local user database to control network access. IEEE
802.1X can also use the IAS to authenticate users. For information about
IEEE 802.1X, see "Configuring 802.1X and Port-Based Security" on page 505.
For information about Captive Portal, see "Configuring a Captive Portal" on
page 445.
The RADIUS server can provide VLAN assignments to devices connected to
the switch ports. For information about RADIUS-assigned VLANs, see
"Dynamic VLAN Creation" on page 510.
Default Management Security Values
By default, the only management access to the switch is through the console
port, and no authentication is required. Table 9-2 describes the default
settings for the management access features.
Table 9-2. Management Security Default Values
Management Security
Feature
Default
Management Access
Control List (ACL)
No access profiles are configured.
Password management
features
Password minimum length is enabled, and the minimum
password length is 8 characters.
Password aging, limiting the number consecutive passwords
before reuse, and limiting the number of allowed consecutive
login attempts are disabled.
Summary of Contents for PowerConnect 7024
Page 134: ...134 Setting Basic Network Information ...
Page 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Page 348: ...348 Configuring SNMP ...
Page 430: ...430 Monitoring Switch Traffic ...
Page 444: ...444 Configuring iSCSI Optimization ...
Page 538: ...538 Configuring 802 1X and Port Based Security ...
Page 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Page 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Page 658: ...658 Configuring the Spanning Tree Protocol ...
Page 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Page 780: ...780 Configuring Connectivity Fault Management ...
Page 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Page 818: ...818 Snooping and Inspecting Traffic ...
Page 836: ...836 Configuring Link Aggregation ...
Page 882: ...882 Configuring DHCP Server Settings ...
Page 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Page 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Page 930: ...930 Configuring L2 and L3 Relay Features ...
Page 1004: ...1004 Configuring OSPF and OSPFv3 ...
Page 1044: ...1044 Configuring VRRP ...
Page 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Page 1064: ...1064 Configuring IPv6 Routing ...
Page 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Page 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Page 1114: ...1114 Configuring Differentiated Services ...
Page 1130: ...1130 Configuring Class of Service ...
Page 1136: ...1136 Configuring Auto VoIP ...
Page 1216: ...1216 Managing IPv4 and IPv6 Multicast ...