
Matrix NSA Series Configuration Guide
14-1
14
Security Configuration
This chapter describes the Security Configuration set of commands and how to use them.
14.1 OVERVIEW OF SECURITY METHODS
The following security methods are available for controlling which users are allowed to access,
monitor, and manage the device.
•
Local user credentials — used for local authentication and authorization of CLI and WebView
management sessions. For details, refer to
Section 2.2.1
and
Section 14.3.1
.
•
Remote AAA service — used for remote authentication, authorization, and accounting of CLI
and WebView management sessions, as well as all network access sessions provisioned by way
of 802.1x, PWA, or MAC Authentication. For details, refer to
Section 14.3.1
and
Section 14.3.5
.
•
Support for RADUIS, RFC 3580, and can be found in the following sections:
Section 14.3.2
,
Section 14.3.3
, and
Section 14.3.4
•
SNMP user or community names — used for authentication and authorization of all SNMP
requests. For details, refer to
Chapter 5
.
•
802.1X Network Access Control — used for controlling access to network resources on a per
port, per user, or per end station basis. For more details, refer to
Section 14.3.5
.
•
Port Web Authentication (PWA) — used for controlling access to network resources on a per
user basis via HTTP. For details, refer to
Section 14.3.6
.
•
MAC Authentication — used for controlling access to network resources on a per MAC address
basis. For details, refer to
Section 14.3.7
.
•
Convergence End Point (CEP) — Convergence Endpoint (CEP) detection is an Enterasys
Networks mechanism for identifying IP phones that are connected to a given switch. When an
endpoint is discovered, a policy is then assigned to the endpoint. For details, refer to
Section 14.3.8