USER’S GUIDE120 CyberSWITCHD EVICE L EVEL S ECURITYCONFIGURING DEVICE L EVEL S ECURITYU SING CFGEDIT1. Select Device Level Security from the Security Level Menu. If you need guidance to find thismenu, refer to the instructions provided in the No Security configuration section.2. Refer to the chapter Configuring Device Level Databases in order to select and configure thedevice level database.U SING M ANAGE M ODEseclevelDisplays the current security level configuration data.DEVICE L EVEL SECURITY BACKGROUND I NFORMATIONDevice level security is an authentication process between internetworking devices, in whichauthentication takes place automatically. Both bridges and routers support this form ofsecurity.Device level security is available to the network locally through the On-node DeviceDatabase or remotely through the VRA Manager or RADIUS Server.Device level security is the default configuration. Through device level security, you have severaloptions for validating remote devices and providing security for the network. The security optionsavailable are dependent on the remote device type and the line protocol in use.The following tables summarize information needed for different device types:Note: For further information regarding network interfaces and their correspondingconfiguration elements, refer to the network interface information refer to the networkinterface information in the Configuring Basic IP Routing Options chapter.Interface Type Associated RemoteDevice TypeSecurityRequired?WAN IP HostPPPoptionalWAN (Direct Host) IP HostPPPoptionalWAN (RLAN) HDLC BridgePPPREQUIREDWAN(UnNumbered)PPP REQUIREDDevice Type Security OptionsPPP CLID, CHAP, PAPHDLC Bridge CLID, MAC Address SecurityIP Host CLID, IP Host ID