
Enterasys G-Series CLI Reference 20-1
20
Security Configuration
This
chapter
describes
the
Security
Configuration
set
of
commands
and
how
to
use
them.
Overview of Security Methods
The
following
security
methods
are
available
for
controlling
which
users
are
allowed
to
access,
monitor,
and
manage
the
switch.
•
Login
user
accounts
and
passwords
–
used
to
log
in
to
the
CLI
via
a
Telnet
connection
or
local
COM
port
connection.
For
details,
refer
to
“
Setting
User
Accounts
and
Passwords
”
on
page 2
‐
2.
•
Host
Access
Control
Authentication
(HACA)
–
authenticates
user
access
of
Telnet
management,
console
local
management
and
WebView
via
a
central
RADIUS
Client/Server
application.
When
RADIUS
is
enabled,
this
essentially
overrides
login
user
accounts.
When
HACA
is
active
per
a
valid
RADIUS
configuration,
the
user
names
and
passwords
used
to
access
the
switch
via
Telnet,
SSH,
WebView,
and
COM
ports
will
be
validated
against
the
configured
RADIUS
server.
Only
in
the
case
of
a
RADIUS
timeout
will
those
credentials
be
compared
against
credentials
locally
configured
on
the
switch.
For
details,
refer
to
“
Configuring
RADIUS
”
on
page 20
‐
3.
•
SNMP
user
or
community
names
–
allows
access
to
the
G
‐
Series
switch
via
a
network
SNMP
management
application.
To
access
the
switch,
you
must
enter
an
SNMP
user
or
community
name
string.
The
level
of
management
access
is
dependent
on
the
associated
access
policy.
For
details,
refer
to
Chapter 5
.
•
802.1X
Port
Based
Network
Access
Control
using
EAPOL
(Extensible
Authentication
Protocol)
–
provides
a
mechanism
via
a
RADIUS
server
for
administrators
to
securely
For information about...
Refer to page...
Overview of Security Methods
20-1
Configuring RADIUS
20-3
Configuring 802.1X Authentication
20-10
Configuring MAC Authentication
20-19
Configuring Multiple Authentication Methods
20-30
Configuring VLAN Authorization (RFC 3580)
20-41
Configuring MAC Locking
20-46
Configuring Port Web Authentication (PWA)
20-57
Configuring Secure Shell (SSH)
20-68
Configuring Access Lists
20-70
Summary of Contents for G3G170-24
Page 1: ...Enterasys G Series Ethernet Switch CLI Reference Firmware Version 1 00 xx P N 9034358 01...
Page 2: ......
Page 30: ...xxviii...
Page 100: ...set ssl 2 56 Basic Configuration...
Page 132: ...clear lldp port tx tlv 3 32 Discovery Protocol Configuration...
Page 272: ...show spantree nonforwardingreason 6 52 Spanning Tree Configuration...
Page 296: ...set garp timer 7 24 802 1Q VLAN Configuration...
Page 384: ...clear nodealias config 11 34 Logging and Network Management...
Page 438: ...Enabling Router Configuration Modes 14 4 Preparing for Router Mode...
Page 514: ...show ip pimsm staticrp 16 56 IPv4 Routing Protocol Configuration...
Page 524: ...traceroute ipv6 17 10 IPv6 Management...
Page 602: ...show ipv6 ospf virtual link 19 46 OSPFv3 Configuration...