71
Using the Business Policy Switch 2000 Version 1.2
Specify optional actions to be exercised by your switch if the software dete ct s
a security violation.
The response can be to send a trap, turn on destination addres s ( DA) fi lt er ing,
disable the specific port, or any combination of these three options.
The MAC address-based security feature is based on Nortel Networks
BaySecure LAN Access for Ethernet, a real-time security system that saf eguard s
Ethernet networks from unauthorized surveillance and intrusion.
For instructions on configuring the MAC address-based security feature, refer to
Chapter 3, Using Web-based Management for the Business Policy Switch 2000
Software Version 1.2, Reference for the Business Policy Switch 2000 Management
Software Version 1.2, and Reference for the Business Policy Switch 2000
Command Line Interface Software Version 1.2.
EAPOL-based security
BPS 2000 software version 1.1 provides support for security based on the
Extensible Authentication Protocol ove r L AN (EAPOL), which uses the EAP as
described in the IEEE Draft P802.1X to allow you to set up network access
control on internal LANs.
For information on configuring EAPOL-based security using the Console
Interface (CI) menus, refer to Chapter 3. To configure this feature using the
Web-based management system, refer to Using Web-based Management for the
Business Policy Switch 2000 Software Version 1.2. To use Device Manager (DM)
to configure EAPOL-based security, refer to Reference for the Business Policy
Switch 2000 Management Software Version 1.2. And, to configure this feature
using CLI commands, refer to Reference for the Business Policy Switch 2000
Command Line Interface Software Version 1.2. book.
EAP allows the exchange of authentication information between any end station
or server connected to the switch and an authentication server (such as a RADIUS
server). The EAPOL-based security feature operates in conjunction with a
RADIUS-based server to extend the benefits of remote authentication to internal
LAN clients.