User guide

ExtremeWare 7.2e Installation and User Guide 137
9 Security
This chapter describes the following topics:
Security Overview on page 137
Network Access Security on page 137
MAC-Based VLANs on page 138
IP Access Lists (ACLs) on page 138
Network Login on page 146
Switch Protection on page 156
Routing Access Profiles on page 156
Denial of Service Protection on page 164
Management Access Security on page 166
Authenticating Users Using RADIUS or TACACS+ on page 166
Secure Shell 2 (SSH2) on page 173
Security Overview
Extreme Networks products incorporate a number of features designed to enhance the security of your
network. No one feature can insure security, but by using a number of features in concert, you can
substantially improve the security of your network. The features described in this chapter are part of an
overall approach to network security
Network Access Security
Network access security features control devices accessing your network. In this category are the
following features:
MAC-Based VLANs
IP Access Lists (ACLs)
Network Login