Specifications
ExtremeWare XOS 11.0 Concepts Guide 147
10 Security
This chapter describes the following topics:
• Security Overview on page 147
• Network Access Security on page 147
• IP Access Control Lists on page 147
• Switch Protection on page 157
• Management Access Security on page 167
• Authenticating Users Using RADIUS or TACACS+ on page 167
• Secure Shell 2 on page 170
Security Overview
Extreme Networks products incorporate a number of features designed to enhance the security of your
network. No one feature can insure security, but by using a number of features in concert, you can
substantially improve the security of your network. The features described in this chapter are part of an
overall approach to network security
Network Access Security
Network access security features control devices accessing your network. In this category is the
following feature:
• IP Access Control Lists
IP Access Control Lists
IP access control lists (ACLs) consist of IP access rules and are used to perform packet filtering and
forwarding decisions on incoming traffic. Each packet arriving on an ingress port is compared to the
access list applied to that port and is either permitted or denied. Permitted packets can also be
forwarded to a specified QoS profile. You can configure the switch to count permitted and denied
(dropped) packets. Using ACLs has no impact on switch performance.