Extreme Networks VSP Operating System Software User manual

Extreme Networks VSP Operating System Software User manual
Show PDF Add to My manuals

VSP Operating System Software is a network operating system designed to configure and manage the network devices. It provides features for security, layer 2 security, EAP, IPsec, MACsec, RADIUS and much more. The system can be managed through CLI and Enterprise Device Manager.

advertisement

Configuring Security on VSP Operating
System Software
NN47227-601
Issue 10.03
December 2017
© 2017, Extreme Networks, Inc.
All Rights Reserved.
Notice
While reasonable efforts have been made to ensure that the
information in this document is complete and accurate at the time of
printing, Extreme Networks, Inc. assumes no liability for any errors.
Extreme Networks, Inc. reserves the right to make changes and
corrections to the information in this document without the obligation
to notify any person or organization of such changes.
Documentation disclaimer
“Documentation” means information published in varying mediums
which may include product information, operating instructions and
performance specifications that are generally made available to users
of products. Documentation does not include marketing materials.
Extreme Networks shall not be responsible for any modifications,
additions, or deletions to the original published version of
Documentation unless such modifications, additions, or deletions
were performed by or on the express behalf of Extreme Networks.
End User agrees to indemnify and hold harmless Extreme Networks,
Extreme Networks’ agents, servants and employees against all
claims, lawsuits, demands and judgments arising out of, or in
connection with, subsequent modifications, additions or deletions to
this documentation, to the extent made by End User.
Link disclaimer
Extreme Networks is not responsible for the contents or reliability of
any linked websites referenced within this site or Documentation
provided by Extreme Networks. Extreme Networks is not responsible
for the accuracy of any information, statement or content provided on
these sites and does not necessarily endorse the products, services,
or information described or offered within them. Extreme Networks
does not guarantee that these links will work all the time and has no
control over the availability of the linked pages.
Warranty
Extreme Networks provides a limited warranty on Extreme Networks
hardware and software. Refer to your sales agreement to establish
the terms of the limited warranty. In addition, Extreme Networks’
standard warranty language, as well as information regarding support
for this product while under warranty is available to Extreme
Networks customers and other parties through the Extreme Networks
Support website: http://www.extremenetworks.com/support under the
link ““Policies” or such successor site as designated by Extreme
Networks. Please note that if You acquired the product(s) from an
authorized Extreme Networks Channel Partner outside of the United
States and Canada, the warranty is provided to You by said Extreme
Networks Channel Partner and not by Extreme Networks.
“Hosted Service” means an Extreme Networks hosted service
subscription that You acquire from either Extreme Networks or an
authorized Extreme Networks Channel Partner (as applicable) and
which is described further in Hosted SAS or other service description
documentation regarding the applicable hosted service. If You
purchase a Hosted Service subscription, the foregoing limited
warranty may not apply but You may be entitled to support services
in connection with the Hosted Service as described further in your
service description documents for the applicable Hosted Service.
Contact Extreme Networks or Extreme Networks Channel Partner (as
applicable) for more information.
Hosted Service
THE FOLLOWING APPLIES ONLY IF YOU PURCHASE AN
EXTREME NETWORKS HOSTED SERVICE SUBSCRIPTION
FROM EXTREME NETWORKS OR AN EXTREME NETWORKS
CHANNEL PARTNER (AS APPLICABLE), THE TERMS OF USE
FOR HOSTED SERVICES ARE AVAILABLE ON THE EXTREME
NETWORKS WEBSITE, https://extremeportal.force.com OR SUCH
SUCCESSOR SITE AS DESIGNATED BY EXTREME NETWORKS,
AND ARE APPLICABLE TO ANYONE WHO ACCESSES OR USES
THE HOSTED SERVICE. BY ACCESSING OR USING THE
HOSTED SERVICE, OR AUTHORIZING OTHERS TO DO SO, YOU,
ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU
ARE DOING SO (HEREINAFTER REFERRED TO
INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO
THE TERMS OF USE. IF YOU ARE ACCEPTING THE TERMS OF
USE ON BEHALF A COMPANY OR OTHER LEGAL ENTITY, YOU
REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH
ENTITY TO THESE TERMS OF USE. IF YOU DO NOT HAVE SUCH
AUTHORITY, OR IF YOU DO NOT WISH TO ACCEPT THESE
TERMS OF USE, YOU MUST NOT ACCESS OR USE THE
HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR
USE THE HOSTED SERVICE.
Licenses
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE
EXTREME NETWORKS WEBSITE, https://extremeportal.force.com
OR SUCH SUCCESSOR SITE AS DESIGNATED BY EXTREME
NETWORKS, ARE APPLICABLE TO ANYONE WHO
DOWNLOADS, USES AND/OR INSTALLS EXTREME NETWORKS
SOFTWARE, PURCHASED FROM EXTREME NETWORKS, INC.,
ANY EXTREME NETWORKS AFFILIATE, OR AN EXTREME
NETWORKS CHANNEL PARTNER (AS APPLICABLE) UNDER A
COMMERCIAL AGREEMENT WITH EXTREME NETWORKS OR
AN EXTREME NETWORKS CHANNEL PARTNER. UNLESS
OTHERWISE AGREED TO BY EXTREME NETWORKS IN
WRITING, EXTREME NETWORKS DOES NOT EXTEND THIS
LICENSE IF THE SOFTWARE WAS OBTAINED FROM ANYONE
OTHER THAN EXTREME NETWORKS, AN EXTREME
NETWORKS AFFILIATE OR AN EXTREME NETWORKS CHANNEL
PARTNER; EXTREME NETWORKS RESERVES THE RIGHT TO
TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING
OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY
INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF
YOURSELF AND THE ENTITY FOR WHOM YOU ARE
INSTALLING, DOWNLOADING OR USING THE SOFTWARE
(HEREINAFTER REFERRED TO INTERCHANGEABLY AS “YOU”
AND “END USER”), AGREE TO THESE TERMS AND CONDITIONS
AND CREATE A BINDING CONTRACT BETWEEN YOU AND
EXTREME NETWORKS, INC. OR THE APPLICABLE EXTREME
NETWORKS AFFILIATE (“EXTREME NETWORKS”).
Extreme Networks grants You a license within the scope of the
license types described below. Where the order documentation does
not expressly identify a license type, the applicable license will be a
Designated System License as set forth below in the Designated
System(s) License (DS) section as applicable. The applicable
number of licenses and units of capacity for which the license is
granted will be one (1), unless a different number of licenses or units
of capacity is specified in the documentation or other materials
available to You. “Software” means computer programs in object
code, provided by Extreme Networks or an Extreme Networks
Channel Partner, whether as stand-alone products, pre-installed on
hardware products, and any upgrades, updates, patches, bug fixes,
or modified versions thereto. “Designated Processor” means a single
stand-alone computing device. “Server” means a set of Designated
Processors that hosts (physically or virtually) a software application
to be accessed by multiple users. “Instance” means a single copy of
the Software executing at a particular time: (i) on one physical
machine; or (ii) on one deployed software virtual machine (“VM”) or
similar deployment.
License type(s)
Designated System(s) License (DS). End User may install and use
each copy or an Instance of the Software only: 1) on a number of
Designated Processors up to the number indicated in the order; or 2)
up to the number of Instances of the Software as indicated in the
order, Documentation, or as authorized by Extreme Networks in
writing. Extreme Networks may require the Designated Processor(s)
to be identified in the order by type, serial number, feature key,
Instance, location or other specific designation, or to be provided by
End User to Extreme Networks through electronic means established
by Extreme Networks specifically for this purpose.
Copyright
Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation, Software, Hosted Service,
or hardware provided by Extreme Networks. All content on this site,
the documentation, Hosted Service, and the product provided by
Extreme Networks including the selection, arrangement and design
of the content is owned either by Extreme Networks or its licensors
and is protected by copyright and other intellectual property laws
including the sui generis rights relating to the protection of databases.
You may not modify, copy, reproduce, republish, upload, post,
transmit or distribute in any way any content, in whole or in part,
including any code and software unless expressly authorized by
Extreme Networks. Unauthorized reproduction, transmission,
dissemination, storage, and or use without the express written
consent of Extreme Networks can be a criminal, as well as a civil
offense under the applicable law.
Virtualization
The following applies if the product is deployed on a virtual machine.
Each product has its own ordering code and license types. Note,
unless otherwise stated, that each Instance of a product must be
separately licensed and ordered. For example, if the end user
customer or Extreme Networks Channel Partner would like to install
two Instances of the same type of products, then two products of that
type must be ordered.
Third Party Components
“Third Party Components” mean certain software programs or
portions thereof included in the Software or Hosted Service may
contain software (including open source software) distributed under
third party agreements (“Third Party Components”), which contain
terms regarding the rights to use certain portions of the Software
(“Third Party Terms”). As required, information regarding distributed
Linux OS source code (for those products that have distributed Linux
OS source code) and identifying the copyright holders of the Third
Party Components and the Third Party Terms that apply is available
in the products, Documentation or on Extreme Networks’ website
at:http://www.extremenetworks.com/support/policies/software-
licensing or such successor site as designated by Extreme Networks.
The open source software license terms provided as Third Party
Terms are consistent with the license rights granted in these Software
License Terms, and may contain additional rights benefiting You,
such as modification and distribution of the open source software.
The Third Party Terms shall take precedence over these Software
License Terms, solely with respect to the applicable Third Party
Components to the extent that these Software License Terms impose
greater restrictions on You than the applicable Third Party Terms.
The following applies only if the H.264 (AVC) codec is distributed with
the product. THIS PRODUCT IS LICENSED UNDER THE AVC
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH
THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE.
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA,
L.L.C. SEE HTTP://WWW.MPEGLA.COM.
Service Provider
THE FOLLOWING APPLIES TO EXTREME NETWORKS CHANNEL
PARTNER’S HOSTING OF EXTREME NETWORKS PRODUCTS
OR SERVICES. THE PRODUCT OR HOSTED SERVICE MAY USE
THIRD PARTY COMPONENTS SUBJECT TO THIRD PARTY
TERMS AND REQUIRE A SERVICE PROVIDER TO BE
INDEPENDENTLY LICENSED DIRECTLY FROM THE THIRD
PARTY SUPPLIER. AN EXTREME NETWORKS CHANNEL
PARTNER’S HOSTING OF EXTREME NETWORKS PRODUCTS
MUST BE AUTHORIZED IN WRITING BY EXTREME NETWORKS
AND IF THOSE HOSTED PRODUCTS USE OR EMBED CERTAIN
THIRD PARTY SOFTWARE, INCLUDING BUT NOT LIMITED TO
MICROSOFT SOFTWARE OR CODECS, THE EXTREME
NETWORKS CHANNEL PARTNER IS REQUIRED TO
INDEPENDENTLY OBTAIN ANY APPLICABLE LICENSE
AGREEMENTS, AT THE EXTREME NETWORKS CHANNEL
PARTNER’S EXPENSE, DIRECTLY FROM THE APPLICABLE
THIRD PARTY SUPPLIER.
WITH RESPECT TO CODECS, IF THE EXTREME NETWORKS
CHANNEL PARTNER IS HOSTING ANY PRODUCTS THAT USE
OR EMBED THE G.729 CODEC, H.264 CODEC, OR H.265
CODEC, THE EXTREME NETWORKS CHANNEL PARTNER
ACKNOWLEDGES AND AGREES THE EXTREME NETWORKS
CHANNEL PARTNER IS RESPONSIBLE FOR ANY AND ALL
RELATED FEES AND/OR ROYALTIES. THE G.729 CODEC IS
LICENSED BY SIPRO LAB TELECOM INC. SEE
WWW.SIPRO.COM/CONTACT.HTML. THE H.264 (AVC) CODEC IS
LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR
THE PERSONAL USE OF A CONSUMER OR OTHER USES IN
WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I) ENCODE
VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC
VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS ENCODED
BY A CONSUMER ENGAGED IN A PERSONAL ACTIVITY AND/OR
WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO
PROVIDE AVC VIDEO. NO LICENSE IS GRANTED OR SHALL BE
IMPLIED FOR ANY OTHER USE. ADDITIONAL INFORMATION
FOR H.264 (AVC) AND H.265 (HEVC) CODECS MAY BE
OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
WWW.MPEGLA.COM.
Compliance with Laws
You acknowledge and agree that it is Your responsibility for
complying with any applicable laws and regulations, including, but not
limited to laws and regulations related to call recording, data privacy,
intellectual property, trade secret, fraud, and music performance
rights, in the country or territory where the Extreme Networks product
is used.
Preventing Toll Fraud
“Toll Fraud” is the unauthorized use of your telecommunications
system by an unauthorized party (for example, a person who is not a
corporate employee, agent, subcontractor, or is not working on your
company's behalf). Be aware that there can be a risk of Toll Fraud
associated with your system and that, if Toll Fraud occurs, it can
result in substantial additional charges for your telecommunications
services.
Security Vulnerabilities
Information about Extreme Networks’ security support policies can be
found in the Global Technical Assistance Center Knowledgebase at
https://gtacknowledge.extremenetworks.com/.
Downloading Documentation
For the most current versions of Documentation, see the Extreme
Networks Support website: http://
documentation.extremenetworks.com, or such successor site as
designated by Extreme Networks.
Contact Extreme Networks Support
See the Extreme Networks Support website:http://
www.extremenetworks.com/support for product or Hosted Service
notices and articles, or to report a problem with your Extreme
Networks product or Hosted Service. For a list of support telephone
numbers and contact addresses, go to the Extreme Networks
Support website:http://www.extremenetworks.com/support/contact/
(or such successor site as designated by Extreme Networks), scroll
to the bottom of the page, and select Contact Extreme Networks
Support.
Contact Avaya Support
See the Avaya Support website: https://support.avaya.com for
product or Hosted Service notices and articles, or to report a problem
with your Avaya product or Hosted Service. For a list of support
telephone numbers and contact addresses, go to the Avaya Support
website: https://support.avaya.com (or such successor site as
designated by Avaya), scroll to the bottom of the page, and select
Contact Avaya Support.
Trademarks
The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation, Hosted Service(s), and product(s) provided
by Extreme Networks are the registered or unregistered Marks of
Extreme Networks, Inc., its affiliates, its licensors, its suppliers, or
other third parties. Users are not permitted to use such Marks without
prior written consent from Extreme Networks or such third party
which may own the Mark. Nothing contained in this site, the
Documentation, Hosted Service(s) and product(s) should be
construed as granting, by implication, estoppel, or otherwise, any
license or right in and to the Marks without the express written
permission of Extreme Networks or the applicable third party.
Extreme Networks is a registered trademark of Extreme Networks,
Inc.
All non-Extreme Networks trademarks are the property of their
respective owners. Linux® is the registered trademark of Linus
Torvalds in the U.S. and other countries.
For additional information on Extreme Networks trademarks, please
see: http://www.extremenetworks.com/company/legal/
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • Page 43
  • Page 44
  • Page 45
  • Page 46
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Page 62
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • Page 67
  • Page 68
  • Page 69
  • Page 70
  • Page 71
  • Page 72
  • Page 73
  • Page 74
  • Page 75
  • Page 76
  • Page 77
  • Page 78
  • Page 79
  • Page 80
  • Page 81
  • Page 82
  • Page 83
  • Page 84
  • Page 85
  • Page 86
  • Page 87
  • Page 88
  • Page 89
  • Page 90
  • Page 91
  • Page 92
  • Page 93
  • Page 94
  • Page 95
  • Page 96
  • Page 97
  • Page 98
  • Page 99
  • Page 100
  • Page 101
  • Page 102
  • Page 103
  • Page 104
  • Page 105
  • Page 106
  • Page 107
  • Page 108
  • Page 109
  • Page 110
  • Page 111
  • Page 112
  • Page 113
  • Page 114
  • Page 115
  • Page 116
  • Page 117
  • Page 118
  • Page 119
  • Page 120
  • Page 121
  • Page 122
  • Page 123
  • Page 124
  • Page 125
  • Page 126
  • Page 127
  • Page 128
  • Page 129
  • Page 130
  • Page 131
  • Page 132
  • Page 133
  • Page 134
  • Page 135
  • Page 136
  • Page 137
  • Page 138
  • Page 139
  • Page 140
  • Page 141
  • Page 142
  • Page 143
  • Page 144
  • Page 145
  • Page 146
  • Page 147
  • Page 148
  • Page 149
  • Page 150
  • Page 151
  • Page 152
  • Page 153
  • Page 154
  • Page 155
  • Page 156
  • Page 157
  • Page 158
  • Page 159
  • Page 160
  • Page 161
  • Page 162
  • Page 163
  • Page 164
  • Page 165
  • Page 166
  • Page 167
  • Page 168
  • Page 169
  • Page 170
  • Page 171
  • Page 172
  • Page 173
  • Page 174
  • Page 175
  • Page 176
  • Page 177
  • Page 178
  • Page 179
  • Page 180
  • Page 181
  • Page 182
  • Page 183
  • Page 184
  • Page 185
  • Page 186
  • Page 187
  • Page 188
  • Page 189
  • Page 190
  • Page 191
  • Page 192
  • Page 193
  • Page 194
  • Page 195
  • Page 196
  • Page 197
  • Page 198
  • Page 199
  • Page 200
  • Page 201
  • Page 202
  • Page 203
  • Page 204
  • Page 205
  • Page 206
  • Page 207
  • Page 208
  • Page 209
  • Page 210
  • Page 211
  • Page 212
  • Page 213
  • Page 214
  • Page 215
  • Page 216
  • Page 217
  • Page 218
  • Page 219
  • Page 220
  • Page 221
  • Page 222
  • Page 223
  • Page 224
  • Page 225
  • Page 226
  • Page 227
  • Page 228
  • Page 229
  • Page 230
  • Page 231
  • Page 232
  • Page 233
  • Page 234
  • Page 235
  • Page 236
  • Page 237
  • Page 238
  • Page 239
  • Page 240
  • Page 241
  • Page 242
  • Page 243
  • Page 244
  • Page 245
  • Page 246
  • Page 247
  • Page 248
  • Page 249
  • Page 250
  • Page 251
  • Page 252
  • Page 253
  • Page 254
  • Page 255
  • Page 256
  • Page 257
  • Page 258
  • Page 259
  • Page 260
  • Page 261
  • Page 262
  • Page 263
  • Page 264
  • Page 265
  • Page 266
  • Page 267
  • Page 268
  • Page 269
  • Page 270
  • Page 271
  • Page 272
  • Page 273
  • Page 274
  • Page 275
  • Page 276
  • Page 277
  • Page 278
  • Page 279
  • Page 280
  • Page 281
  • Page 282
  • Page 283
  • Page 284
  • Page 285
  • Page 286
  • Page 287
  • Page 288
  • Page 289
  • Page 290
  • Page 291
  • Page 292
  • Page 293
  • Page 294
  • Page 295
  • Page 296
  • Page 297
  • Page 298
  • Page 299
  • Page 300
  • Page 301
  • Page 302
  • Page 303
  • Page 304
  • Page 305
  • Page 306
  • Page 307
  • Page 308
  • Page 309
  • Page 310
  • Page 311
  • Page 312
  • Page 313
  • Page 314
  • Page 315
  • Page 316
  • Page 317
  • Page 318
  • Page 319
  • Page 320
  • Page 321
  • Page 322
  • Page 323
  • Page 324
  • Page 325
  • Page 326
  • Page 327
  • Page 328
  • Page 329
  • Page 330
  • Page 331
  • Page 332
  • Page 333
  • Page 334
  • Page 335
  • Page 336
  • Page 337
  • Page 338
  • Page 339
  • Page 340
  • Page 341
  • Page 342
  • Page 343
  • Page 344
  • Page 345
  • Page 346
  • Page 347
  • Page 348
  • Page 349
  • Page 350
  • Page 351
  • Page 352
  • Page 353
  • Page 354
  • Page 355
  • Page 356
  • Page 357
  • Page 358
  • Page 359
  • Page 360
  • Page 361
  • Page 362
  • Page 363
  • Page 364
  • Page 365
  • Page 366
  • Page 367
  • Page 368
  • Page 369
  • Page 370
  • Page 371
  • Page 372
  • Page 373
  • Page 374
  • Page 375
  • Page 376
  • Page 377
  • Page 378
  • Page 379
  • Page 380
  • Page 381
  • Page 382
  • Page 383
  • Page 384
  • Page 385
  • Page 386
  • Page 387
  • Page 388
  • Page 389
  • Page 390
  • Page 391
  • Page 392
  • Page 393
  • Page 394
  • Page 395
  • Page 396
  • Page 397
  • Page 398
  • Page 399
  • Page 400
  • Page 401
  • Page 402
  • Page 403
  • Page 404
  • Page 405
  • Page 406
  • Page 407
  • Page 408
  • Page 409
  • Page 410
  • Page 411
  • Page 412
  • Page 413
  • Page 414
  • Page 415
  • Page 416
  • Page 417
  • Page 418
  • Page 419
  • Page 420
  • Page 421
  • Page 422
  • Page 423
  • Page 424
  • Page 425
  • Page 426
  • Page 427
  • Page 428
  • Page 429
  • Page 430
  • Page 431
  • Page 432
  • Page 433
/

advertisement

Key Features

  • Security modes
  • Layer 2 security
  • Extensible Authentication Protocol over LAN
  • IPsec
  • MACsec
  • RADIUS
  • CLI and EDM management

Related manuals

Frequently Answers and Questions

What is the purpose of the hsecure mode?
The hsecure mode provides enhanced security for the system. It requires a password to access the device and disables unauthorized access. The mode is enabled by default.
How can I view the configured IPsec policies?
You can view configured IPsec policies in CLI using command "show ipsec policy all". Details can also be accessed through EDM.
How can I configure MACsec encryption on a port?
You can configure MACsec encryption on a port in CLI using command "macsec port encryption enable". You can also configure the confidentiality offset on the port using the "macsec port confidentiality-offset ". The encryption and confidentiality offset settings can be changed through the EDM.
How can I configure RADIUS server reachability?
You can configure RADIUS server reachability in CLI using command "radius server reachability start ". You can also access this information through the EDM interface.
How can I prevent Toll Fraud?
Toll Fraud is the unauthorized use of your telecommunications system by an unauthorized party. The manual mentions that there can be a risk of Toll Fraud associated with the system and that, if Toll Fraud occurs, it can result in substantial additional charges for your telecommunications services. The manual does not provide specific instructions for preventing Toll Fraud.

advertisement

Table of contents