ProCurve 6200yl User's Guide Page 30

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 29
1-4
Security Overview
Switch Access Security
Inbound Telnet Access and Web Browser Access
The default remote management protocols enabled on the switch are plain
text protocols, which transfer passwords in open or plain text that is easily
captured. To reduce the chances of unauthorized users capturing your pass-
words, secure and encrypted protocols such as SSH and SSL must be used for
remote access. This enables you to employ increased access security while
still retaining remote client access.
SSHv2 provides Telnet-like connections through encrypted and authenti-
cated transactions.
SSLv3/TLSv1 provides remote Web browser access to the switch via
encrypted paths between the switch and management station clients
capable of SSL/TLS operation.
(For information on SSH, refer to Chapter 8 “Configuring Secure Shell (SSH)”;
for details on SSL, refer to Chapter 9, “Configuring Secure Socket Layer
(SSL)”.)
Also, access security on the switch is incomplete without disabling Telnet and
the standard Web browser access. Among the methods for blocking unautho-
rized access attempts using Telnet or the Web browser are the following two
CLI commands:
no telnet-server: This command blocks inbound Telnet access.
no web-management: This command prevents use of the Web browser
interface through http (port 80) server access.
If you choose not to disable Telnet and Web browser access, you may want to
consider using RADIUS accounting to maintain a record of password-pro-
tected access to the switch. Refer to Chapter 6, “RADIUS Authentication and
Accounting” in this guide.
SNMP Access (Simple Network Management Protocol)
In the default configuration, the switch is open to access by management
stations running SNMP management applications capable of viewing and
changing the settings and status data in the switch’s MIB (Management
Information Base). Thus, controlling SNMP access to the switch and prevent-
ing unauthorized SNMP access should be a key element of your network
security strategy.
General SNMP Access to the Switch. The switch supports SNMP ver-
sions 1, 2c, and 3, including SNMP community and trap configuration. The
default configuration supports versions 1 and 2c compatibility, which uses
plain text and does not provide security options. ProCurve recommends that
Page view 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 595 596

Comments to this Manuals

No comments