15-10
Using Authorized IP Managers
WebAgent: Configuring IP Authorized Managers
Web Proxy Servers
If you use the WebAgent to access the switch from an authorized IP manager
station, it is highly recommended that you avoid using a web proxy server in
the path between the station and the switch. This is because switch access
through a web proxy server requires that you first add the web proxy server
to the Authorized Manager IP list. This reduces security by opening switch
access to anyone who uses the web proxy server.
How to Eliminate the Web Proxy Server
There are two ways to eliminate a web proxy server from the path between a
station and the switch:
1.
Add the IP address or DNS name of the switch to the non-proxy or
Exceptions list in the web browser interface used on the authorized
station.
2.
If you don’t need proxy server access on the authorized station, disable
the proxy server feature in the station’s web browser interface.
N o t e
IP or MAC authentication can be used without a web proxy server.
Using a Web Proxy Server to Access the WebAgent
C a u t i o n
This is NOT recommended. Using a web proxy server between the stations
and the switch poses a security risk. If the station uses a web proxy server to
connect to the switch, any proxy user can access the switch.
If it is necessary to use the WebAgent and your browser access is through a
web proxy server, perform these steps:
1.
Enter the web proxy server’s MAC address in the port’s Authorized
Addresses list.
2.
Enter the web proxy server’s IP address in the switch’s IP Authorized
Managers list.
You must perform both of these steps or the switch only detects the proxy
server’s MAC address and IP address instead of your workstation addresses,
and your connection is considered unauthorized.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......