84
Chapter 1 The Business Policy Switch 2000
208700-C
EAPOL-based security configuration rules
The following configuration rules apply to your BPS 2000 when using
EAPOL-based security:
•
Before configuring your switch, you must configure the Primary RADIUS
Server and Shared Secret fields.
•
You cannot configure EAPOL-based security on ports that are currently
configured for:
— Shared segments
— MultiLink Trunking
— MAC address-based security
— IGMP (Static Router Ports)
— Port mirroring
•
You can connect only a single client on each port that is configured for
EAPOL-based security. (If you attempt to add additional ports to a port, that
port goes to Blocking mode.)
EAPOL-based security uses the RADIUS protocol to authenticate local console,
Telnet, and EAPOL-authorized logins. Refer to
for more information on using the RADIUS protocol.
Flash memory storage
Switch software image storage
The Business Policy Switch uses flash memory to store the switch software
image. The flash memory allows you to update the software image with a newer
version without changing the switch hardware (see Chapter 3). An in-band
connection between the switch and the TFTP load host is required to download
the software image.
Summary of Contents for business policy switch 2000
Page 16: ...16 Contents 208700 C ...
Page 22: ...22 Figures 208700 C ...
Page 26: ...26 Tables 208700 C ...
Page 32: ...32 Preface 208700 C ...
Page 308: ...308 Chapter 4 Policy enabled networks 208700 C ...
Page 348: ...348 Chapter 5 Sample QoS configuration 208700 C ...
Page 392: ...392 Appendix D Connectors and pin assignments 208700 C ...