ProCurve 6200yl User's Guide Page 33

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 32
1-7
Security Overview
Switch Access Security
Other Provisions for Management Access Security
The following features can help to prevent unauthorized management access
to the switch.
Authorized IP Managers
This feature uses IP addresses and masks to determine whether to allow
management access to the switch across the network through the following :
Telnet and other terminal emulation applications
The switch’s Web browser interface
SNMP (with a correct community name)
For more information, refer to Chapter 15, “Using Authorized IP Managers”.
Secure Management VLAN
This feature creates an isolated network for managing the ProCurve switches
that offer this feature. When a secure management VLAN is enabled, CLI, Menu
interface, and Web browser interface access is restricted to ports configured
as members of the VLAN. For more information, refer to the chapter titled
“Static Virtual LANs (VLANs)” in the Advanced Traffic Management Guide.
TACACS+ Authentication
This application uses a central server to allow or deny access to TACACS-
aware devices in your network. TACACS+ uses username/password sets with
associated privilege levels to grant or deny access through either the switch’s
serial (console) port or remotely, with Telnet. If the switch fails to connect to
a TACACS+ server for the necessary authentication service, it defaults to its
own locally configured passwords for authentication control. TACACS+
allows both login (read-only) and enable (read/write) privilege level access.
For more information, refer to Chapter 5, “TACACS+ Authentication”.
RADIUS Authentication
For each authorized client, RADIUS can be used to authenticate operator or
manager access privileges on the switch via the serial port (CLI and Menu
interface), Telnet, SSH, and Secure FTP/Secure Copy (SFTP/SCP) access
methods. Refer to Chapter 6, “RADIUS Authentication and Accounting”.
ACLs for Management Access Protection
ACLs can also be configured to protect management access by blocking
inbound IP traffic that has the switch itself as the destination IP address.
(Refer to “Access Control Lists (ACLs)” in the next section.)
Page view 32
1 2 ... 28 29 30 31 32 33 34 35 36 37 38 ... 595 596

Comments to this Manuals

No comments