Process Overview: Security Configuration
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment
14-4 Matrix NSA Series Configuration Guide
14.2 PROCESS OVERVIEW: SECURITY CONFIGURATION
Use the following steps as a guide to configuring security methods on the device:
1. Setting the Authentication Login Method (Section 14.3.1)
2. Configuring RADIUS (Section 14.3.2)
3. Configuring RFC 3580 Support (Section 14.3.4)
4. Configuring TACACS+ (Section 14.3.4)
5. Configuring 802.1X Authentication (Section 14.3.5)
6. Configuring Port Web Authentication (PWA) (Section 14.3.6)
7. Configuring MAC Authentication (Section 14.3.7)
8. Configuring Convergence End Point (CEP) (Section 14.3.8)
9. Configuring MAC Locking (Section 14.3.9)
10.Configuring Multiple Authentication (Section 14.3.10)
11.Configuring Secure Shell (SSH) (Section 14.3.11)
12.Configuring Access Lists (Section 14.3.12)
13.Configuring Policy-Based Routing (Section 14.3.13)
14.Configuring Denial of Service (DoS) Prevention (Section 14.3.14)
15.Configuring Flow Setup Throttling (FST) (Section 14.3.15)