Dell PowerConnect 8024 User's Guide - Page 36
Command-Line Interface Documentation, CLI Reference Guide - powerconnect 8024f user guide
View all Dell PowerConnect 8024 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 36 highlights
Locked Port Support The locked port feature limits access on a port to users with specific MAC addresses. These addresses are manually defined or learned on that port. When a frame is seen on a locked port, and the frame source MAC address is not tied to that port, the protection mechanism is invoked. For information about enabling locked port security, see "Port Security." Password Management Security Password management provides increased network security and improved password control. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP access are assigned security features. For more information about password management, see "Password Management." TACACS+ TACACS+ provides centralized security for validation of users accessing the switch. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. RADIUS Client RADIUS is a client/server-based protocol in which the server maintains a user database that contains user authentication information, such as user name, password, and accounting information. SSH/SSL Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. This connection provides functionality that is similar to an inbound telnet connection. Secure Sockets Layer (SSL) protocol provides a means of abstracting an encrypted connection between two stations. Once established, such a connection is virtually no different to use than an unsecured connection. Command-Line Interface Documentation Another resource for the PowerConnect 8024/8024F is the CLI Reference Guide, which is located on the Dell Support website at www.support.dell.com/manuals. It provides information about the commandline interface (CLI) commands used to configure and manage the switch. The document provides indepth CLI descriptions, syntax, default values, and examples. 36 Introduction