5-4
Authentication
General System Requirements
General System Requirements
To use authentication, you need the following:
■
A server application installed and configured on one or
more servers or management stations in your network. (There are
several software packages available.)
■
A switch configured for authentication, with access to one
or more servers.
N o t e s
The effectiveness of security depends on correctly using your
server application. For this reason, HP recommends that you
thoroughly test all configurations used in your network.
TACACS-aware HP switches include the capability of configuring multiple
backup servers. HP recommends that you use a server
application that supports a redundant backup installation. This allows you to
configure the switch to use a backup server if it loses access to the
first-choice server.
does not affect WebAgent access. Refer to “Controlling WebAgent
Access When Using Authentication” on page 5-28.
General Authentication Setup Procedure
It is important to test the service before fully implementing it.
Depending on the process and parameter settings you use to set up and test
authentication in your network, you could accidentally lock all
users, including yourself, out of access to a switch. While recovery is simple,
it may pose an inconvenience that can be avoided.To prevent an unintentional
lockout on the switch, use a procedure that configures and tests
protection for one access type (for example, Telnet access), while keeping the
other access type (console, in this case) open in case the Telnet access fails
due to a configuration problem. The following procedure outlines a general
setup procedure.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......