Specifications

Process Overview: Security Configuration
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment
13-4 Matrix DFE-Gold Series Configuration Guide
13.2 PROCESS OVERVIEW: SECURITY CONFIGURATION
Use the following steps as a guide to configuring security methods on the device:
1. Setting the Authentication Login Method (Section 13.3.1)
2. Configuring RADIUS (Section 13.3.2)
3. Configuring RFC 3580 Support (Section 13.3.4)
4. Configuring TACACS+ (Section 13.3.4)
5. Configuring 802.1X Authentication (Section 13.3.5)
6. Configuring Port Web Authentication (PWA) (Section 13.3.6)
7. Configuring MAC Authentication (Section 13.3.7)
8. Configuring Convergence End Point (CEP) (Section 13.3.8)
9. Configuring MAC Locking (Section 13.3.9)
10.Configuring Multiple Authentication (Section 13.3.10)
11.Configuring Secure Shell (SSH) (Section 13.3.11)
12.Configuring Access Lists (Section 13.3.12)
13.Configuring Policy-Based Routing (Section 13.3.13)
14.Configuring Denial of Service (DoS) Prevention (Section 13.3.14)
15.Configuring Flow Setup Throttling (FST) (Section 13.3.15)