Specifications
Process Overview: Security Configuration
10-2 SecureStack A2 Configuration Guide
• MAC Authentication – provides a mechanism for administrators to securely authenticate source
MAC addresses and grant appropriate access to end user devices communicating on SecureStack
A2 ports. For details, refer to Section 10.3.3.
• Multiple Authentication Methods – allows users to authenticate using multiple methods of
authentication on the same port. For details, refer to Section 10.3.4.
• RFC 3580 Tunnel Attributes provide a mechanism to contain an 802.1X authenticated user to a
VLAN regardless of the PVID, refer to Section 10.3.5.
• MAC Locking – locks a port to one or more MAC addresses, preventing the use of unauthorized
devices and MAC spoofing on the port. For details, refer to Section 10.3.6.
• Secure Shell (SSH) – provides secure Telnet. For details, refer to Section 10.3.7.
10.2 PROCESS OVERVIEW: SECURITY CONFIGURATION
Use the following steps as a guide to configuring security methods on the device:
1. Configuring RADIUS (Section 10.3.1)
2. Configuring 802.1X Authentication (Section 10.3.2)
3. Configuring MAC Authentication (Section 10.3.3)
4. Configuring multiple authentication methods (Section 10.3.4)
5. Configuring RFC 3580 RADIUS tunnel attributes (Section 10.3.5)
6. Configuring MAC Locking (Section 10.3.6)
7. Configuring Secure Shell (SSH) (Section 10.3.7)