Enterasys Matrix DFE-Gold Series Configuration Guide 24-1
24

Security Configuration

ThischapterdescribestheSecurityConfigurationsetofcommandsandhowtousethem.

Overview of Security Methods

Thefollowingsecuritymethodsareavailableforcontrollingwhichusersareallowedtoaccess,
monitor,andmanagethedevice.
•LocalusercredentialsusedforlocalauthenticationandauthorizationofCLIandWebView
managementsessions.Fordetails,refertoSettingUserAccountsandPasswordson
page 215andSettingtheAuthenticationLoginMethodonpage 2550.
•SNMPuserorcommunitynamesusedforauthenticationandauthorizationofallSNMP
requests.Fordetails,refertoChapter 5.
•MACLockinglocksaporttooneormoreMACaddresses,preventingconnectionof
unauthorizeddevicesviatheport.Fordetails,refertoConfiguringMACLockingon
page 242.
•SecureShell(SSH)providesforsecureremoteCLImanagementaccess.Fordetails,referto
ConfiguringSecureShell(SSH)onpage 2411.
•IPAccessLists(ACLs)permitsordeniesaccesstoroutinginterfacesbasedonprotocoland
inboundand/oroutboundIPaddressrestrictionsconfiguredinaccesslists.Fordetails,referto
ConfiguringAccessListsonpage 2415.
•PolicyBasedRoutingpermitsordeniesaccesstoroutinginterfacesbasedonaccesslistsin
aroutemapappliedtotheinterface.Fordetails,refertoConfiguringDenialofService(DoS)
Preventiononpage 2422.
•DenialofService(DoS)PreventionpreventsDenialofServiceattacks,includingland,
fragmentedandlargeICMPpackets,spoofedaddressattacks,andUDP/TCPportscanning.
Fordetails,refertoConfiguringDenialofService(DoS)Preventiononpage 2422.
For information about... Refer to page...
Overview of Security Methods 24-1
Configuring MAC Locking 24-2
Configuring Secure Shell (SSH) 24-11
Configuring Access Lists 24-15
Configuring Denial of Service (DoS) Prevention 24-22
Configuring Flow Setup Throttling (FST) 24-25