Getting Started

Overview of Access Security Features

Table 1-1. Management Access Security Protection

Security Feature

Offers Protection Against Unauthorized Client Access to

Offers Protection

 

 

Switch Management Features

 

Against

 

Connection

Telnet

SNMP

Web

SSH

Unauthorized Client

 

Access to the

 

 

 

(Net Mgmt)

Browser

Client

 

 

 

Network

 

 

 

 

 

 

Local Manager and Operator

PtP:

Yes

No

Yes

Yes

No

Usernames and Passwords1

Remote:

Yes

No

Yes

Yes

No

 

TACACS+

PtP:

Yes

No

No

Yes

No

 

Remote:

Yes

No

No

Yes

No

RADIUS

PtP:

Yes

No

No

Yes

No

 

Remote:

Yes

No

No

Yes

No

SSH

Ptp:

Yes

No

No

Yes

No

 

Remote:

Yes

No

No

Yes

No

SSL

Ptp:

No

No

Yes

No

No

 

Remote:

No

No

Yes

No

No

Port-Based Access Control (802.1X)

PtP:

Yes

Yes

Yes

Yes

Yes

 

Remote:

No

No

No

No

No

Port Security (MAC address)

PtP:

Yes

Yes

Yes

Yes

Yes

 

Remote:

Yes

Yes

Yes

Yes

Yes

Authorized IP Managers

PtP:

Yes

Yes

Yes

Yes

No

 

Remote:

Yes

Yes

Yes

Yes

No

 

 

 

 

 

 

 

General Switch Traffic Security Guidelines

Where the switch is running multiple security options, it implements network traffic security based on the OSI (Open Systems Interconnection model) precedence of the individual options, from the lowest to the highest. The following list shows the order in which the switch implements configured security features on traffic moving through a given port.

1.Disabled/Enabled physical port

2.Port security

3.Authorized IP Managers

4.Application features at higher levels in the OSI model, such as SSH

(The above list does not address the mutually exclusive relationship that exists among some security features.)

1-4