2-20
Configuring Username and Password Security
Saving Security Credentials in a Config File
•
copy config
<
source-filename
>
config
<
target-filename
>: Makes a local
copy of an existing startup-config file by copying the contents of the
startup-config file in one memory slot to a new startup-config file in
another, empty memory slot.
•
copy config tftp
: Uploads a configuration file from the switch to a TFTP
server.
•
copy tftp config
: Downloads a configuration file from a TFTP server to
the switch.
•
copy config xmodem
: Uploads a configuration file from the switch to
an Xmodem host.
•
copy xmodem config
: Downloads a configuration file from an Xmodem
host to the switch.
For more information, see “Transferring Startup-Config Files To or From
a Remote Server” in the
Management and Configuration Guide.
■
The switch can store up to three configuration files. Each configuration
file contains its own security credentials and these security configurations
may differ. It is the responsibility of the system administrator to ensure
that the appropriate security credentials are contained in the
configuration file that is loaded with each software image and that all
security credentials in the file are supported.
■
If you have already enabled the storage of security credentials (including
local manager and operator passwords) by entering the
include-
credentials
command, the
Reset-on-clear
option is disabled. When you
press the Clear button on the front panel, the manager and operator
usernames and passwords are deleted from the running configuration.
However, the switch does not reboot after the local passwords are erased.
(The
reset-on-clear
option normally reboots the switch when you press
the Clear button.)
For more information about the
Reset-on-clear
option and other front-
panel security features, see “Configuring Front-Panel Security” on page
2-26 in this guide.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......