Specifications
SecureStack C3 Configuration Guide 21-1
21
Security Configuration
ThischapterdescribestheSecurityConfigurationsetofcommandsandhowtousethem.
Overview of Security Methods
Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowedtoaccess,
monitor,andmanagetheswitch.
•Loginuseraccountsandpasswords–usedtologintotheCLIviaaTelnetconnectionorlocal
COMportconnection.Fordetails,referto“SettingUserAccountsandPasswords”
on
page 3‐2.
•HostAccessControlAuthentication(HACA)–authenticatesuseraccessofTelnet
management,consolelocalmanagementandWebViewviaacentralRADIUSClient/Server
application.WhenRADIUSisenabled,thisessentiallyoverridesloginuseraccounts.When
HACAisactiveperavalidRADIUSconfiguration,theusernamesandpasswordsused
to
accesstheswitchviaTelnet,SSH,WebView,and COM portswillbevalidatedagainstthe
configuredRADIUSserver.OnlyinthecaseofaRADIUStimeoutwillthosecredentialsbe
comparedagainstcredentialslocallyconfiguredontheswitch.
Fordetails,referto
“ConfiguringRADIUS”onpage 21‐4.
•SNMPuserorcommunitynames–allowsaccesstotheSecureStackC3switchviaanetwork
SNMPmanagementapplication.Toaccesstheswitch,youmustenteranSNMPuseror
communitynamestring.Thelevelofmanagementaccessisdependenton
theassociated
accesspolicy.Fordetails,refertoChapter 5.
For information about... Refer to page...
Overview of Security Methods 21-1
Configuring RADIUS 21-4
Configuring 802.1X Authentication 21-12
Configuring MAC Authentication 21-23
Configuring Multiple Authentication Methods 21-34
Configuring VLAN Authorization (RFC 3580) 21-42
Configuring MAC Locking 21-46
Configuring Port Web Authentication (PWA) 21-56
Configuring Secure Shell (SSH) 21-68
Configuring Access Lists 21-70