![Nortel 2000 Скачать руководство пользователя страница 71](http://html.mh-extra.com/html/nortel/2000/2000_using-manual_1706145071.webp)
71
Using the Business Policy Switch 2000 Version 1.2
•
Specify optional actions to be exercised by your switch if the software detects
a security violation.
The response can be to send a trap, turn on destination address (DA) filtering,
disable the specific port, or any combination of these three options.
The MAC address-based security feature is based on Nortel Networks
BaySecure
™
LAN Access for Ethernet, a real-time security system that safeguards
Ethernet networks from unauthorized surveillance and intrusion.
For instructions on configuring the MAC address-based security feature, refer to
Chapter 3, Using Web-based Management for the Business Policy Switch 2000
Software Version 1.2, Reference for the Business Policy Switch 2000 Management
Software Version 1.2, and Reference for the Business Policy Switch 2000
Command Line Interface Software Version 1.2.
EAPOL-based security
BPS 2000 software version 1.1 provides support for security based on the
Extensible Authentication Protocol over LAN (EAPOL), which uses the EAP as
described in the IEEE Draft P802.1X to allow you to set up network access
control on internal LANs.
For information on configuring EAPOL-based security using the Console
Interface (CI) menus, refer to Chapter 3. To configure this feature using the
Web-based management system, refer to Using Web-based Management for the
Business Policy Switch 2000 Software Version 1.2. To use Device Manager (DM)
to configure EAPOL-based security, refer to Reference for the Business Policy
Switch 2000 Management Software Version 1.2. And, to configure this feature
using CLI commands, refer to Reference for the Business Policy Switch 2000
Command Line Interface Software Version 1.2. book.
EAP allows the exchange of authentication information between any end station
or server connected to the switch and an authentication server (such as a RADIUS
server). The EAPOL-based security feature operates in conjunction with a
RADIUS-based server to extend the benefits of remote authentication to internal
LAN clients.
Содержание 2000
Страница 16: ...16 Contents 208700 B ...
Страница 22: ...22 Figures 208700 B ...
Страница 26: ...26 Tables 208700 B ...
Страница 32: ...32 Preface 208700 B ...
Страница 85: ...Chapter 1 The Business Policy Switch 2000 85 Using the Business Policy Switch 2000 Version 1 2 ...
Страница 86: ...86 Chapter 1 The Business Policy Switch 2000 208700 B ...
Страница 272: ...272 Chapter 3 Using the console interface 208700 B ...
Страница 292: ...292 Chapter 4 Policy enabled networks 208700 B ...
Страница 326: ...326 Chapter 5 Sample QoS configuration 208700 B ...
Страница 346: ...346 Appendix B Interoperability in a mixed stack configuration 208700 B ...
Страница 368: ...368 Appendix C Media dependent adapters 208700 B ...
Страница 386: ...386 Appendix E Connectors and pin assignments 208700 B ...