
Configuring Device Security
Configuring Network Security
Configuring Network Security
Network security manages both access control lists and locked ports. This section contains the following topics:
•Network Security Overview
•Defining Network Authentication Properties
•Defining Port Authentication
•Configuring Traffic Control
Network Security Overview
This section provides an overview of network security and contains the following topics:
•
•Advanced
Port-Based Authentication
•Authenticators — Specifies the device port which is authenticated before permitting system access.
•Supplicants — Specifies the host connected to the authenticated port requesting to access the system ser- vices.
•Authentication Server — Specifies the server that performs the authentication on behalf of the authentica- tor, and indicates whether the supplicant is authorized to access system services.
•Controlled Access — Permits communication between the supplicant and the system, if the supplicant is authorized.
•Uncontrolled Access — Permits uncontrolled communication regardless of the port state.
The device currently supports
Advanced Port-Based Authentication
Advanced
Advanced
Advanced
•Single Host Mode — Only the authorized host can access the port.
•Multiple Host Mode — Multiple hosts can be attached to a single port. Only one host must be authorized for all hosts to access the network. If the host authentication fails, or an
Page 83