Network Administration: Security
245
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User
Guide\Dell_Astute_Network_Admin_Security.fm
D E L L CO N F I D E N T I A L – P R E L I M I N A RY 8 / 9 / 16 - F O R P RO O F O N L Y
15
Network Administration: Security
This section describes the various mechanisms for providing security on the
switch.
It contains the following topics:
• Dot1x Authentications
• Storm Control Configuration
• Port Security
• Dynamic ARP Inspection (DAI)
• ACL and ACE
Dot1x Authentications
This section describes Dot1x authentication.
It contains the following topics:
• Port-Based Authentication Overview
• Dot1x Overview
• Port-Based Authentication Global
• Port-Based Authentication Interface Settings
• Host Authentication
• Port Authentication Users
Port-Based Authentication Overview
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the RADIUS server
using the Extensible Authentication Protocol (EAP). Port Authentication
includes: