4

MANAGING DEVICE SECURITY

 

The Management Security section provides information for configuring system access, defining RADIUS authentication, port-based authentication, and access control lists.

This section includes the following topics:

Configuring System Access

Defining RADIUS Clients

Defining Port-Based Authentication (802.1X)

Defining Local Database Authentication

Encrypting Connection to the Web Interface (HTTPS)

Using the Secure Shell Protocol (SSH)

Defining Access Control Lists

Using Broadcast Storm Control

Page 53
Image 53
3Com 3CRDSF9PWR manual Managing Device Security