SGS-6341-Series User Manual

Table Of Contents
45.2 SECURITY FEATURE CONFIGURATION ........................................................................................... 45-103
45.2.1 Prevent IP Spoofing Function Configuration Task Sequence ......................................... 45-103
45.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence ......... 45-103
45.2.3 Anti Port Cheat Function Configuration Task Sequence................................................. 45-104
45.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence ......................... 45-104
45.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence ....................... 45-104
45.3 SECURITY FEATURE EXAMPLE...................................................................................................... 45-105
CHAPTER 46 TACACS+ CONFIGURATION.............................................................46-106
46.1 INTRODUCTION TO TACACS+ ...................................................................................................... 46-106
46.2 TACACS+ CONFIGURATION TASK LIST ........................................................................................ 46-106
46.3 TACACS+ SCENARIOS TYPICAL EXAMPLES................................................................................. 46-107
46.4 TACACS+ TROUBLESHOOTING ................................................................................................... 46-108
CHAPTER 47 RADIUS CONFIGURATION................................................................47-109
47.1 INTRODUCTION TO RADIUS......................................................................................................... 47-109
47.1.1 AAA and RADIUS Introduction........................................................................................ 47-109
47.1.2 Message Structure for RADIUS ...................................................................................... 47-109
47.2 RADIUS CONFIGURATION TASK LIST ............................................................................................47-111
47.3 RADIUS TYPICAL EXAMPLES ...................................................................................................... 47-113
47.3.1 IPv4 RADIUS Example ................................................................................................... 47-113
47.3.2 IPv6 RADIUS Example ................................................................................................... 47-114
47.4 RADIUS TROUBLESHOOTING ...................................................................................................... 47-115
CHAPTER 48 SSL CONFIGURATION.......................................................................48-116
48.1 INTRODUCTION TO SSL................................................................................................................ 48-116
48.1.1 Basic Element of SSL ..................................................................................................... 48-117
48.2 SSL CONFIGURATION TASK LIST .................................................................................................. 48-118
48.3 SSL TYPICAL EXAMPLE ............................................................................................................... 48-119
48.4 SSL TROUBLESHOOTING ............................................................................................................. 48-120
CHAPTER 49 IPV6 SECURITY RA CONFIGURATION.............................................49-121
49.1 INTRODUCTION TO IPV6 SECURITY RA.......................................................................................... 49-121
49.2 IPV6 SECURITY RA CONFIGURATION TASK SEQUENCE.................................................................. 49-121
49.3 IPV6 SECURITY RA TYPICAL EXAMPLES....................................................................................... 49-122
49.4 IPV6 SECURITY RA TROUBLESHOOTING HELP .............................................................................. 49-123
CHAPTER 50 MAB CONFIGURATION .....................................................................50-124
50.1 INTRODUCTION TO MAB............................................................................................................... 50-124
50.2 MAB CONFIGURATION TASK LIST................................................................................................. 50-124
11