Switch User Manual
Contents
10
Section VIII: Port Security .....................................................................................413
Chapter 35: MAC Address-based Port Security ........................................................................................415
Supported Platforms .......................................................................................................................................416
Overview .........................................................................................................................................................417
Automatic..................................................................................................................................................417
Limited......................................................................................................................................................417
Secured ....................................................................................................................................................418
Locked......................................................................................................................................................418
Invalid Frames and Intrusion Actions..............................................................................................................419
Guidelines .......................................................................................................................................................420
Chapter 36: 802.1x Port-based Network Access Control .........................................................................421
Supported Platforms .......................................................................................................................................422
Overview .........................................................................................................................................................423
Authentication Process ...................................................................................................................................425
Port Roles .......................................................................................................................................................426
None Role.................................................................................................................................................426
Authenticator Role....................................................................................................................................426
Supplicant Role ........................................................................................................................................428
Authenticator Ports with Single and Multiple Supplicants ...............................................................................429
Single Operating Mode.............................................................................................................................429
Multiple Operating Mode ..........................................................................................................................433
Supplicant and VLAN Associations.................................................................................................................436
Single Operating Mode.............................................................................................................................437
Multiple Operating Mode ..........................................................................................................................437
Supplicant VLAN Attributes on the RADIUS Server.................................................................................437
Guest VLAN ....................................................................................................................................................438
RADIUS Accounting........................................................................................................................................439
General Steps .................................................................................................................................................440
Guidelines .......................................................................................................................................................441
Section IX: Management Security .........................................................................445
Chapter 37: Web Server ..............................................................................................................................447
Supported Platforms .......................................................................................................................................448
Overview .........................................................................................................................................................449
Supported Protocols.................................................................................................................................449
Configuring the Web Server for HTTP ............................................................................................................450
Configuring the Web Server for HTTPS..........................................................................................................451
General Steps for a Self-signed Certificate ..............................................................................................451
General Steps for a Public or Private CA Certificate................................................................................451
Chapter 38: Encryption Keys ......................................................................................................................453
Supported Platforms .......................................................................................................................................454
Overview .........................................................................................................................................................455
Encryption Key Length....................................................................................................................................456
Encryption Key Guidelines..............................................................................................................................457
Technical Overview.........................................................................................................................................458
Data Encryption ........................................................................................................................................458
Data Authentication ..................................................................................................................................460
Key Exchange Algorithms ........................................................................................................................461