Specifications

SecureStack C3 Configuration Guide 21-1
21
Security Configuration
ThischapterdescribestheSecurityConfigurationsetofcommandsandhowtousethem.
Overview of Security Methods
Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowedtoaccess,
monitor,andmanagetheswitch.
•LoginuseraccountsandpasswordsusedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,refertoSettingUserAccountsandPasswords
on
page 32.
•HostAccessControlAuthentication(HACA)authenticatesuseraccessofTelnet
management,consolelocalmanagementandWebViewviaacentralRADIUSClient/Server
application.WhenRADIUSisenabled,thisessentiallyoverridesloginuseraccounts.When
HACAisactiveperavalidRADIUSconfiguration,theusernamesandpasswordsused
to
accesstheswitchviaTelnet,SSH,WebView,and COM portswillbevalidatedagainstthe
configuredRADIUSserver.OnlyinthecaseofaRADIUStimeoutwillthosecredentialsbe
comparedagainstcredentialslocallyconfiguredontheswitch.
Fordetails,referto
ConfiguringRADIUSonpage 214.
•SNMPuserorcommunitynamesallowsaccesstotheSecureStackC3switchviaanetwork
SNMPmanagementapplication.Toaccesstheswitch,youmustenteranSNMPuseror
communitynamestring.Thelevelofmanagementaccessisdependenton
theassociated
accesspolicy.Fordetails,refertoChapter 5.
For information about... Refer to page...
Overview of Security Methods 21-1
Configuring RADIUS 21-4
Configuring 802.1X Authentication 21-12
Configuring MAC Authentication 21-23
Configuring Multiple Authentication Methods 21-34
Configuring VLAN Authorization (RFC 3580) 21-42
Configuring MAC Locking 21-46
Configuring Port Web Authentication (PWA) 21-56
Configuring Secure Shell (SSH) 21-68
Configuring Access Lists 21-70