Specifications

Process Overview: Security Configuration
11-2 SecureStack B2 Configuration Guide
MAC Locking – locks a port to one or more MAC addresses, preventing connection of
unauthorized devices via the port. For details, refer to Section 11.3.4
Secure Shell (SSH) – provides secure Telnet. For details, refer to Section 11.3.5.
11.2 PROCESS OVERVIEW: SECURITY CONFIGURATION
Use the following steps as a guide to configuring security methods on the device:
1. Configuring RADIUS (Section 11.3.1)
2. Configuring 802.1X Authentication (Section 11.3.2)
3. Configuring RFC 3580 RADIUS tunnel attributes (Section 11.3.3)
4. Configuring MAC Locking (Section 11.3.4)
5. Configuring Secure Shell (SSH) (Section 11.3.5)