75
Using the Business Policy Switch 2000 Version 2.0
2.0
. To use Device Manager (DM) to configure VLANs, refer to
Reference for the
Business Policy Switch 2000 Management Software Version 2.0
.
And, to configure
this feature using CLI commands, refer to
Reference for the Business Policy
Switch 2000 Command Line Interface Software Version 2.0
.
Security
The Business Policy Switch security features provide three levels of security for
your local area network (LAN):
•
RADIUS-based security—limits administrative access to the switch through
user authentication
•
MAC address-based security— limits access to the switch based on allowed
source MAC addresses (and allowed destination MAC addresses, beginning
with software version 2.0)
•
EAPOL-based security—allows the exchange of authentication information
between any end station or server connected to the switch and authentication
server (such as a RADIUS server)
shows a typical campus configuration using the RADIUS-based and
MAC address-based security features for the Business Policy Switch. This
example assumes that the switch, the teachers’ offices and classrooms, and the
library are physically secured. The student dormitory may (or may not be)
physically secure.
Содержание business policy switch 2000
Страница 16: ...16 Contents 208700 C ...
Страница 22: ...22 Figures 208700 C ...
Страница 26: ...26 Tables 208700 C ...
Страница 32: ...32 Preface 208700 C ...
Страница 308: ...308 Chapter 4 Policy enabled networks 208700 C ...
Страница 348: ...348 Chapter 5 Sample QoS configuration 208700 C ...
Страница 392: ...392 Appendix D Connectors and pin assignments 208700 C ...