170
Controlling Management Access
For information about port-based access, 802.1X, and the Internal
Authentication Server (IAS), see "Configuring 802.1X and Port-Based
Security" on page 505.
Table 9-1. Management Security Features
Management Security
Feature
Description
Management Access
Control List (ACL)
Contains rules to apply to one or more in-band ports, LAGs,
or VLANs to limit management access by method (for
example, Telnet or HTTP) and/or source IP address.
NOTE:
Management ACLs cannot be applied to the OOB port.
Authentication
Profiles
Controls the authentication method(s) to use to validate
switch management access for the users associated with the
list.
Local User Database
Maintains a list of users who are allowed to access the switch
management interface. The database contains a username
with an associated password and security level. The
supported security levels are Read-Write (15), Read Only (1),
and Suspended (0).
Password management
features
Includes settings such as minimum password length,
password aging, password reuse rules, password strength
criteria, and number of login attempts allowed.
Line and Enable
passwords
Passwords to allow only authorized users to access the switch
through the CLI interface (console, Telnet, and SSH) and to
enter Privileged Exec mode from User Exec mode.
Configure the switch to use a remote server to
authenticate users.
RADIUS
Configure information about one or more remote RADIUS
servers to use for authentication, authorization, and
accounting.
Telnet
Allow or prevent access to the switch by using Telnet and
specify the port to use.
DoS
Protect the switch from various DoS attacks that can prevent
the control plane (which includes management access) from
functioning.
Summary of Contents for PowerConnect 7024
Page 134: ...134 Setting Basic Network Information ...
Page 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Page 348: ...348 Configuring SNMP ...
Page 430: ...430 Monitoring Switch Traffic ...
Page 444: ...444 Configuring iSCSI Optimization ...
Page 538: ...538 Configuring 802 1X and Port Based Security ...
Page 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Page 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Page 658: ...658 Configuring the Spanning Tree Protocol ...
Page 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Page 780: ...780 Configuring Connectivity Fault Management ...
Page 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Page 818: ...818 Snooping and Inspecting Traffic ...
Page 836: ...836 Configuring Link Aggregation ...
Page 882: ...882 Configuring DHCP Server Settings ...
Page 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Page 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Page 930: ...930 Configuring L2 and L3 Relay Features ...
Page 1004: ...1004 Configuring OSPF and OSPFv3 ...
Page 1044: ...1044 Configuring VRRP ...
Page 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Page 1064: ...1064 Configuring IPv6 Routing ...
Page 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Page 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Page 1114: ...1114 Configuring Differentiated Services ...
Page 1130: ...1130 Configuring Class of Service ...
Page 1136: ...1136 Configuring Auto VoIP ...
Page 1216: ...1216 Managing IPv4 and IPv6 Multicast ...