- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
00-Security Volume Organization | 28.44 KB |
Security Volume Organization
Manual Version
20091105-C-1.03
Product Version
Release 6300 series
Organization
The Security Volume is organized as follows:
Features |
Description |
AAA |
Authentication, Authorization and Accounting (AAA) provide a uniform framework used for configuring these three security functions to implement the network security management. This document introduces the commands for AAA configuration. |
802.1X |
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network access control protocol that is used as the standard for LAN user access authentication. This document introduces the commands for 802.1X configuration. |
MAC Authentication |
MAC authentication provides a way for authenticating users based on ports and MAC addresses; it requires no client software to be installed on the hosts. This document introduces the commands for MAC Authentication configuration. |
Portal |
Portal authentication, as its name implies, helps control access to the Internet. This document introduces the commands for Portal configuration. |
Port Security |
Port security is a MAC address-based security mechanism for network access controlling. It is an extension to the existing 802.1X authentication and MAC authentication. This document introduces the commands for Port Security configuration. |
IP Source Guard |
By filtering packets on a per-port basis, IP source guard prevents illegal packets from traveling through, thus improving the network security. This document introduces the commands for IP Source Guard configuration. |
SSH2.0 |
SSH ensures secure login to a remote device in a non-secure network environment. By encryption and strong authentication, it protects the device against attacks. This document introduces the commands for SSH2.0 configuration. |
ACL |
An ACL is used for identifying traffic based on a series of preset matching criteria. This document introduces the commands for ACL configuration. |