4
MANAGING DEVICE SECURITY
The Management Security section provides information for configuring
system access, defining RADIUS authentication, port-based
authentication, and access control lists.
This section includes the following topics:
■ Configuring System Access
■ Defining RADIUS Clients
■ Defining Port-Based Authentication (802.1X)
■ Defining Local Database Authentication
■ Encrypting Connection to the Web Interface (HTTPS)
■ Using the Secure Shell Protocol (SSH)
■ Defining Access Control Lists
■ Using Broadcast Storm Control