![HP HP ProCurve Series 6600 Access Security Manual Download Page 38](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101038.webp)
1-4
Security Overview
Access Security Features
SSL
disabled
Secure Socket Layer (SSL) and Transport Layer Security
(TLS) provide remote Web browser access (WebAgent)
to the switch via authenticated transactions and
encrypted paths between the switch and management
station clients capable of SSL/TLS operation. The
authenticated type includes server certificate
authentication with user password authentication.
“Quick Start: Using the
Management Interface
Wizard” on page 1-10
Chapter 9, “Configuring
Secure Socket Layer (SSL)”
SNMP
public,
unrestricted
In the default configuration, the switch is open to access
by management stations running SNMP management
applications capable of viewing and changing the
settings and status data in the switch’s MIB
(Management Information Base). Thus, controlling
SNMP access to the switch and preventing
unauthorized SNMP access should be a key element of
your network security strategy.
“SNMP Security Guidelines”
on page 1-13;
see the section
“Using
SNMP Tools To Manage the
Switch” in the Management
and Configuration Guide
Authorized IP
Managers
none
This feature uses IP addresses and masks to determine
whether to allow management access to the switch
across the network through the following :
• Telnet and other terminal emulation applications
• The WebAgent
• SNMP (with a correct community name)
Chapter 15, “Using
Authorized IP Managers”
Secure
Management
VLAN
disabled
This feature creates an isolated network for managing
the HP switches that offer this feature. When a secure
management VLAN is enabled, CLI, Menu interface, and
WebAgent access is restricted to ports configured as
members of the VLAN.
Advanced Traffic
Management Guide,
refer to
the chapter
“Static Virtual
LANs (VLANs)”
ACLs for
Management
Access
Protection
none
ACLs can also be configured to protect management
access by blocking inbound IP traffic that has the switch
itself as the destination IP address.
“Access Control Lists
(ACLs)” on page 1-7
Chapter 10, “IPv4 Access
Control Lists (ACLs)”
Authentication
disabled
This application uses a central server to allow or deny
access to TACACS-aware devices in your network.
uses username/password sets with
associated privilege levels to grant or deny access
through either the switch’s serial (console) port or
remotely, with Telnet.
If the switch fails to connect to a server for the
necessary authentication service, it defaults to its own
locally configured passwords for authentication control.
allows both login (read-only) and enable
(read/write) privilege level access.
Chapter 5, “
Authentication”
RADIUS
Authentication
disabled
For each authorized client, RADIUS can be used to
authenticate operator or manager access privileges on
the switch via the serial port (CLI and Menu interface),
Telnet, SSH, and Secure FTP/Secure Copy (SFTP/SCP)
access methods.
Chapter 6, “RADIUS
Authentication and
Accounting”
Feature
Default
Setting
Security Guidelines
More Information and
Configuration Details
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......