67
Using the Business Policy Switch 2000 Version 1.2
•
EAPOL-based security—allows the exchange of authentication information
between any end station or server connected to the switch and authentication
server (such as a RADIUS server)
Figure 7
shows a typical campus configuration using the RADIUS-based and
MAC address-based security features for the Business Policy Switch. This
example assumes that the switch, the teachers’ offices and classrooms, and the
library are physically secured. The student dormitory may (or may not be)
physically secure.
Summary of Contents for 2000
Page 16: ...16 Contents 208700 B ...
Page 22: ...22 Figures 208700 B ...
Page 26: ...26 Tables 208700 B ...
Page 32: ...32 Preface 208700 B ...
Page 86: ...86 Chapter 1 The Business Policy Switch 2000 208700 B ...
Page 272: ...272 Chapter 3 Using the console interface 208700 B ...
Page 292: ...292 Chapter 4 Policy enabled networks 208700 B ...
Page 326: ...326 Chapter 5 Sample QoS configuration 208700 B ...
Page 346: ...346 Appendix B Interoperability in a mixed stack configuration 208700 B ...
Page 368: ...368 Appendix C Media dependent adapters 208700 B ...
Page 386: ...386 Appendix E Connectors and pin assignments 208700 B ...