Allied Telesis AT-S63 User Manual
Page 12

Contents
12
Deleting a Certificate ....................................................................................................................................................................................... 594
Viewing a Certificate ........................................................................................................................................................................................ 596
Generating an Enrollment Request ............................................................................................................................................................ 599
Installing CA Certificates onto a Switch .................................................................................................................................................... 602
Viewing or Configuring the Number of Certificates in the Database ............................................................................................ 603
Configuring SSL ................................................................................................................................................................................................. 604
Chapter 28
Secure Shell (SSH) ........................................................................................................................................................................................... 607
SSH Overview ..................................................................................................................................................................................................... 608
Support for SSH ........................................................................................................................................................................................ 608
SSH Server .................................................................................................................................................................................................. 609
SSH Clients ................................................................................................................................................................................................. 609
SSH and Enhanced Stacking ................................................................................................................................................................ 610
SSH Configuration Guidelines ............................................................................................................................................................ 611
General Steps for Configuring SSH ................................................................................................................................................... 611
Configuring SSH ................................................................................................................................................................................................ 613
Displaying SSH Information .......................................................................................................................................................................... 616
Chapter 29
802.1x Port-based Network Access Control ...................................................................................................................................... 619
IEEE 802.1x Port-based Network Access Control Overview ............................................................................................................... 620
Authentication Process ......................................................................................................................................................................... 621
Port Roles .................................................................................................................................................................................................... 622
None Role ........................................................................................................................................................................................... 622
Authenticator Role .......................................................................................................................................................................... 622
Supplicant Role ................................................................................................................................................................................. 623
RADIUS Accounting ................................................................................................................................................................................ 624
General Steps ............................................................................................................................................................................................ 625
Port-based Network Access Control Guidelines .......................................................................................................................... 626
Setting Port Roles .............................................................................................................................................................................................. 629
Enabling or Disabling 802.1x Port-based Network Access Control ................................................................................................ 631
Configuring Authenticator Port Parameters ........................................................................................................................................... 632
Configuring Supplicant Port Parameters ................................................................................................................................................. 636
Displaying the Port Access Parameters ..................................................................................................................................................... 639
Configuring RADIUS Accounting ................................................................................................................................................................ 641
Chapter 30
TACACS+ and RADIUS Protocols ............................................................................................................................................................. 644
TACACS+ and RADIUS Overview ................................................................................................................................................................. 645
Enabling TACACS+ or RADIUS ............................................................................................................................................................ 648
Disabling TACACS+ or RADIUS ........................................................................................................................................................... 649
Configuring TACACS+ ..................................................................................................................................................................................... 650
Displaying the TACACS+ Settings ............................................................................................................................................................... 652
Configuring RADIUS ......................................................................................................................................................................................... 654
Displaying RADIUS Status and Settings .................................................................................................................................................... 656
Chapter 31
Denial of Service Defense ........................................................................................................................................................................... 659
Denial of Service Overview ............................................................................................................................................................................ 660
SYN Flood Attack ..................................................................................................................................................................................... 660
SMURF Attack ........................................................................................................................................................................................... 661
Land Attack ................................................................................................................................................................................................ 661
Teardrop Attack ....................................................................................................................................................................................... 662
Ping of Death Attack .............................................................................................................................................................................. 663