5-10
Authentication
Configuring on the Switch
Configuring the Switch’s Authentication Methods
The
aaa authentication
command configures access control for the following
access methods:
■
Console
■
Telnet
■
SSH
■
Web
■
Port-access (802.1X)
However, authentication is only used with the console, Telnet, or
SSH access methods. The command specifies whether to use a
server or the switch’s local authentication, or (for some secondary scenarios)
no authentication (meaning that if the primary method fails, authentication is
denied). The command also reconfigures the number of access attempts to
allow in a session if the first attempt uses an incorrect username/password
pair.
Using the Privilege-Mode Option for Login
When using to control user access to the switch, you must first login
with your username at the Operator privilege level using the password for
Operator privileges, and then login again with the same username but using
the Manger password to obtain Manager privileges. You can avoid this double
login process by entering the
privilege-mode
option with the
aaa authentication
login
command to enable for a single login. The switch authenti-
cates your username/password, then requests the privilege level (Operator or
Manager) that was configured on the server for this username/
password. The server returns the allowed privilege level to the
switch. You are placed directly into Operator or Manager mode, depending on
your privilege level.
HP Switch(config) aaa authentication login privilege-mode
The
no
version of the above command disables single login capa-
bility.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......