A SERVICE OF

logo

Workgroup Remote Access Switch 137
C
ONFIGURING
S
ECURITY
L
EVEL
Overview
Plan what level(s) of security you will use, and configure them now. You will later assign and
configure authentication databases to the network security level you configure and to
administration sessions. The table below identifies the types of authentication databases that are
applicable (specified by yes) for each type of network security and for administration sessions.
Database Device Level
Security
User Level
Security
Administration
Sessions
On-Node yes no yes
RADIUS yes yes yes
TACACS no yes yes
ACE no yes yes
VRA
Manager
yes no no
ISDN
ISDN
ISDN Router
POWER
SERVICE
TX
RX
10BASE - T
LAN B-CHANNELS E1 ONLY
B2 B4
B6 B8
B26 B28
B22 B24
B18 B20
B14 B16
B10 B12
B30 L1
B1 B3
B5 B7
B25 B27
B21 B23
B17 B19
B13 B15
B9 B11
B29 B31
E1
D
T1
D
POWER
SERVICE
TX
RX
10BASE - T
LAN B-CHANNELS E1 ONLY
B2 B4
B6 B8
B26 B28
B22 B24
B18 B20
B14 B16
B10 B12
B30 L1
B1 B3
B5 B7
B25 B27
B21 B23
B17 B19
B13 B15
B9 B11
B29 B31
E1
D
T1
D