Specifications
Contents
SecureStack B2 Configuration Guide xv
11
SECURITY CONFIGURATION
11.1 Overview of Security Methods ...................................................................... 11-1
11.2 Process Overview: Security Configuration.................................................... 11-2
11.3 Security Configuration Command Set........................................................... 11-3
11.3.1 Configuring RADIUS ..................................................................... 11-3
11.3.1.1 show radius ................................................................ 11-4
11.3.1.2 set radius.................................................................... 11-6
11.3.1.3 clear radius................................................................. 11-8
11.3.1.4 show radius accounting.............................................. 11-9
11.3.1.5 set radius accounting ............................................... 11-10
11.3.1.6 clear radius accounting ............................................ 11-12
11.3.2 Configuring 802.1X Authentication ............................................. 11-13
11.3.2.1 show dot1x ............................................................... 11-14
11.3.2.2 show dot1x auth-config ............................................ 11-17
11.3.2.3 set dot1x................................................................... 11-19
11.3.2.4 set dot1x auth-config................................................ 11-20
11.3.2.5 clear dot1x auth-config............................................. 11-22
11.3.2.6 show eapol ............................................................... 11-24
11.3.2.7 set eapol................................................................... 11-27
11.3.2.8 clear eapol................................................................ 11-28
11.3.3 Configuring VLAN Authorization (RFC 3580) ............................. 11-29
11.3.3.1 set vlanauthorization ................................................ 11-30
11.3.3.2 set vlanauthorization egress .................................... 11-31
11.3.3.3 clear vlanauthorization ............................................. 11-32
11.3.3.4 show vlanauthorization............................................. 11-33
11.3.4 Configuring MAC Locking ........................................................... 11-35
11.3.4.1 show maclock........................................................... 11-36
11.3.4.2 show maclock stations ............................................. 11-38
11.3.4.3 set maclock enable .................................................. 11-40
11.3.4.4 set maclock disable.................................................. 11-41
11.3.4.5 set maclock firstarrival.............................................. 11-42
11.3.4.6 clear maclock firstarrival........................................... 11-43
11.3.4.7 set maclock trap ....................................................... 11-44
11.3.5 Configuring Secure Shell (SSH) ................................................. 11-45
11.3.5.1 show ssh status........................................................ 11-46
11.3.5.2 set ssh...................................................................... 11-47
11.3.5.3 set ssh hostkey ........................................................ 11-48
INDEX