Summit 300-48 Switch Software User Guide 83
7Unified Access Security
This chapter describes the security features of the Summit 300-48 switch and includes information on
the following topics:
Overview of Security on page 83
User Access Security on page84
Network Security Policies on page 8 7
Network Security Policies on page 8 7
CLI Commands for Security on the Switch on page 89

Overview of Security

The Extreme Unified Access™ Security architecture provides secure access for all wired and wireless
stations within the unified network. You can maintain the network with a single, unified security
policy, provide service to all stations without requiring upgrades, and take advantage of integrated
policy and management capabilities not available in overlay networks or those with “thick” access
points. Unified Access Security provides the following key capabilities:
Consolidated management — Up to 48 wireless ports from a single Summit 300-48 switch, larger
network support with less management overhead
Scalable encryption — ASIC based AES encryption, WPA with TKIP support, and RC4 based WEP
support on the Altitude 300 wireless port
802.1x Authentication — 802.1x authentication (PEAP, EAP-TTLS, EAP-TLS)
The unified structure simplifies security policies without compromising protection and provides the
following benefits:
Single user experience — Same authentication procedures for wired and wireless users
Unified management — Single management platform for wired and wireless networks
Unified configuration — Consistent CLI for wired and wireless functions
Single authentication infrastructure — Single set of policies, RADIUS, and certificate servers
These security features provide protection for users and for the network infrastructure.