
4-6
Features
Description
HABP
On an HABP-capable switch, HABP packets can bypass 802.1X
authentication and MAC authentication, allowing communication among
switches in a cluster. This document describes:
z
Introduction to HABP
z
HABP configuration
MAC Authentication
MAC authentication provides a way for authenticating users based on
ports and MAC addresses; it requires no client software to be installed on
the hosts. This document describes:
z
RADIUS-Based MAC Authentication
z
Local MAC Authentication
Port Security
Port security is a MAC address-based security mechanism for network
access controlling. It is an extension to the existing 802.1X authentication
and MAC authentication. This document describes:
z
Enabling Port Security
z
Setting the Maximum Number of Secure MAC Addresses
z
Setting the Port Security Mode
z
Configuring Port Security Features
z
Configuring Secure MAC Addresses
z
Ignoring Authorization Information from the Server
IP Source Guard
By filtering packets on a per-port basis, IP source guard prevents illegal
packets from traveling through, thus improving the network security. This
document describes:
z
Configuring a Static Binding Entry
z
Configuring Dynamic Binding Function
SSH2.0
SSH ensures secure login to a remote device in a non-secure network
environment. By encryption and strong authentication, it protects the
device against attacks. This document describes:
z
Configuring Asymmetric Keys
z
Configuring the Device as an SSH Server
z
Configuring the Device as an SSH Client
z
Configuring an SFTP Server
z
Configuring an SFTP Client
PKI
The Public Key Infrastructure (PKI) is a hierarchical framework designed
for providing information security through public key technologies and
digital certificates and verifying the identities of the digital certificate
owners. This document describes PKI related configuration.
SSL
Secure Sockets Layer (SSL) is a security protocol providing secure
connection service for TCP-based application layer protocols, this
document describes SSL related configuration.
Public Key
Configuration
This document describes Public Key Configuration.
ACL
An ACL is used for identifying traffic based on a series of preset matching
criteria. This document describes:
z
ACL overview and ACL types
z
ACL configuration
Содержание S5120-EI Series
Страница 139: ...ii...
Страница 268: ...3 3 SwitchB system view SwitchB interface vlan interface 1 SwitchB Vlan interface1 ip address dhcp alloc...
Страница 328: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1...
Страница 578: ...1 21 C...
Страница 739: ...1 12 Enable ARP detection based on 802 1X security entries SwitchB arp detection mode dot1x...
Страница 926: ...2 8...
Страница 942: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5...
Страница 985: ...1 1...
Страница 1018: ...1 6...