Specifications

Enterasys Matrix N Standalone (NSA) Series Configuration Guide 24-1
24
Security Configuration
ThischapterdescribestheSecurityConfigurationsetofcommandsandhowtousethem.
Overview of Security Methods
Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowedtoaccess,
monitor,andmanagethedevice.
•LocalusercredentialsusedforlocalauthenticationandauthorizationofCLIandWebView
managementsessions.Fordetails,refertoSettingUserAccountsandPasswordson
page 215andSetting
theAuthenticationLoginMethodonpage 2550.
•SNMPuserorcommunitynamesusedforauthenticationandauthorizationofallSNMP
requests.Fordetails,refertoChapter 5.
•MACLockinglocksaporttooneormoreMACaddresses,preventingconnectionof
unauthorizeddevicesviatheport.Fordetails,referto
ConfiguringMACLockingon
page 242.
•SecureShell(SSH)providesforsecureremoteCLImanagementaccess.Fordetails,referto
ConfiguringSecureShell(SSH)onpage 2411.
•IPAccessLists(ACLs)permitsordeniesaccesstoroutinginterfacesbasedonprotocoland
inboundand/oroutboundIPaddress
restrictionsconfiguredinaccesslists.Fordetails,referto
ConfiguringAccessListsonpage 2415.
•PolicyBasedRoutingpermitsordeniesaccesstoroutinginterfacesbasedonaccesslistsin
aroutemapappliedtotheinterface.Fordetails,refertoConfiguringDenialofService(DoS)
Preventionon
page 2422.
•DenialofService(DoS)PreventionpreventsDenialofServiceattacks,includingland,
fragmentedandlargeICMPpackets,spoofedaddressattacks,andUDP/TCPportscanning.
Fordetails,refertoConfiguringDenialofService(DoS)Preventiononpage 2422.
For information about... Refer to page...
Overview of Security Methods 24-1
Configuring MAC Locking 24-2
Configuring Secure Shell (SSH) 24-11
Configuring Access Lists 24-15
Configuring Denial of Service (DoS) Prevention 24-22
Configuring Flow Setup Throttling (FST) 24-25