SECURITYThe CyberSWITCH provides a great variety of security options. These options include device levelsecurity, user level security, a combination of the two, or if preferred, no security. There aredifferent ways to authenticate, as well as different locations (both local and remote) to store securityinformation. This segment addresses these areas.We include the following chapters in the Security Configuration segment of the User’s Guide:• Security OverviewThe “Big Picture” of how our standard security options work, and how they interoperate.• Configuring Security LevelInstructions for enabling the level of security you wish to use for security. You may choose toenable no security, device level security, user level security, or both device and user levelsecurity.• Configuring System Options and InformationInstructions for enabling system options, such as PPP Link security, for configuring systeminformation, such as a system password, and for configuring secure yet flexible administrationsessions.• Configuring Device Level DatabasesInstructions for configuring an on-node device database (formerly known as the local user list)and enabling an off-node device database. Off-node device databases supported are: VRAManager and RADIUS.• Configuring User Level DatabasesInstructions for enabling an off-node database with user level security. User level databasessupported are: RADIUS, TACACS, and ACE.• Configuring Off-node Server InformationInstructions for configuring an off-node server, such as VRA Manager, RADIUS, TACACS, andACE.• Configuring Network Login InformationInstructions for configuring general network login information, network login banners, andinformation specific to RADIUS and TACACS servers.