Security configuration, 1 overview of security methods, Overview of security methods -1 – Enterasys Networks 1G58x-09 User Manual
Page 683: Chapter 14

Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide
14-1
14
Security Configuration
This chapter describes the Security Configuration set of commands and how to use them.
14.1 OVERVIEW OF SECURITY METHODS
The following security methods are available for controlling which users are allowed to access,
monitor, and manage the device.
•
Login Security Password – used to log in to the CLI via a Telnet connection or local COM port
connection. For details, refer to
•
SNMP – allows access to the Matrix E1 device via a network SNMP management application.
The level of management access is dependent on the SNMP user or community name and the
associated access policy. For details, refer to
•
Host Access Control Authentication (HACA) – authenticates user access of Telnet management,
console local management and WebView via a central RADIUS Client/Server application. For
an overview on working with HACA, refer to
. For details, on using CLI
commands to configure HACA/RADIUS, refer to
•
802.1X Port Based Network Access Control using EAPOL (Extensible Authentication Protocol
Over LANs) - provides a mechanism via a RADIUS server for administrators to securely
authenticate and grant appropriate access to end user devices directly attached to Matrix E1
device ports. For an overview on working with 802.1X, refer to
using CLI commands to configure 802.1X, refer to
•
MAC Authentication – provides a mechanism for administrators to securely authenticate source
MAC addresses and grant appropriate access to end user devices directly attached to Matrix E1
device ports. For an overview on working with MAC authentication, refer to
details on using CLI commands to configure MAC authentication, refer to
•
MAC Locking – locks a port to one or more MAC addresses, preventing connection of
unauthorized devices via the port. For details, refer to
.