
101
Reference for the Business Policy Switch 2000 Command Line Interface
Chapter 3
Security
This chapter describes the security commands available with the CLI. There are
four types of security available on the BPS 2000:
• “Using the IP manager list,” next
• “Using MAC address security” on page 106
• “Using EAPOL-based security” on page 112
• “Using RADIUS authentication” on page 115
Refer to Using the Business Policy Switch 2000 Software Version 1.2 for more
information on these security features, as well as using the console interface (CI)
menus. Refer to Using Web-based Management for the Business Policy Switch
2000 Software Version 1.2 for information on configuring these features using the
Web-based management system, and refer to Reference for the Business Policy
Switch 2000 Management Software Version 1.2 for information on configuring
with the DM.
Using the IP manager list
When enabled, the IP manager list determines which source IP addresses are
allowed access to the BPS 2000. No other source IP addresses have access to the
switch. You configure the IP manager list using the following commands:
• “show ipmgr command,” next
• “ipmgr command for management system” on page 103
• “no ipmgr command for management system” on page 104
• “ipmgr command for source IP address” on page 105
• “no ipmgr command for source IP address” on page 105
Komentarze do niniejszej Instrukcji