Matrix E1 Series (1G58x-09 and 1H582-xx) Configuration Guide 14-1
14
Security Configuration
This chapter describes the Security Configuration set of commands and how to use them.

14.1 OVERVIEW OF SECURITY METHODS

The following security methods are available for controlling which users are allowed to access,
monitor, and manage the device.
Login Security Password – used to log in to the CLI via a Telnet connection or local COM port
connection. For details, refer to Section 3.2.1.
SNMP – allows access to the Matrix E1 device via a network SNMP management application.
The level of management access is dependent on the SNMP user or community name and the
associated access policy. For details, refer to Chapter5.
Host Access Control Authentication (HACA) – authenticates user access of Telnet management,
console local management and WebView via a central RADIUS Client/Server application. For
an overview on working with HACA, refer to Section 14.4.1. For details, on using CLI
commands to configure HACA/RADIUS, refer to Section 14.3.1.
802.1X Port Based Network Access Control using EAPOL (Extensible Authentication Protocol
Over LANs) - provides a mechanism via a RADIUS server for administrators to securely
authenticate and grant appropriate access to end user devices directly attached to Matrix E1
device ports. For an overview on working with 802.1X, refer to Section 14.4.2. For details on
using CLI commands to configure 802.1X, refer to Section 14.3.2.
MAC Authentication – provides a mechanism for administrators to securely authenticate source
MAC addresses and grant appropriate access to end user devices directly attached to Matrix E1
device ports. For an overview on working with MAC authentication, refer to Section 14.4.3. For
details on using CLI commands to configure MAC authentication, refer to Section 14.3.3.
MAC Locking – locks a port to one or more MAC addresses, preventing connection of
unauthorized devices via the port. For details, refer to Section 14.3.4.