Extreme Networks 300-48 Switch User Manual


 
Summit 300-48 Switch Software User Guide 83
7 Unified Access Security
This chapter describes the security features of the Summit 300-48 switch and includes information on
the following topics:
Overview of Security on page 83
User Access Security on page 84
Network Security Policies on page 87
Network Security Policies on page 87
CLI Commands for Security on the Switch on page 89
Overview of Security
The Extreme Unified Access™ Security architecture provides secure access for all wired and wireless
stations within the unified network. You can maintain the network with a single, unified security
policy, provide service to all stations without requiring upgrades, and take advantage of integrated
policy and management capabilities not available in overlay networks or those with “thick” access
points. Unified Access Security provides the following key capabilities:
Consolidated management — Up to 48 wireless ports from a single Summit 300-48 switch, larger
network support with less management overhead
Scalable encryption — ASIC based AES encryption, WPA with TKIP support, and RC4 based WEP
support on the Altitude 300 wireless port
802.1x Authentication — 802.1x authentication (PEAP, EAP-TTLS, EAP-TLS)
The unified structure simplifies security policies without compromising protection and provides the
following benefits:
Single user experience — Same authentication procedures for wired and wireless users
Unified management — Single management platform for wired and wireless networks
Unified configuration — Consistent CLI for wired and wireless functions
Single authentication infrastructure — Single set of policies, RADIUS, and certificate servers
These security features provide protection for users and for the network infrastructure.