1-2
Getting Started
Introduction
Introduction
This
Access Security Guide
describes how to use ProCurve’s switch security
features to protect access to your switch. This guide is intended to support
the following switches:
■
ProCurve Switch 2510-24
■
ProCurve Switch 2510-48
For an overview of other product documentation for the above switches, refer
to “Product Documentation” on page xi.
You can download a copy from the ProCurve Networking Website,
www.procurve.com/manuals
, then select your switch product.
Overview of Access Security Features
The access security features covered in this guide include:
■
Local Manager and Operator Passwords
(page 2-1): Control
access and privileges for the CLI, menu, and Web browser interfaces.
■
Authentication
(page 4-1): Uses an authentication appli-
cation on a server to allow or deny access to a switch.
■
RADIUS Authentication and Accounting
(page 5-1): Like
, uses an authentication application on a central server to
allow or deny access to the switch. RADIUS also provides accounting
services for sending data about user activity and system events to a
RADIUS server.
■
Secure Shell (SSH) Authentication
(page 6-1): Provides
encrypted paths for remote access to switch management functions.
■
Secure Socket Layer (SSL)
(page 7-1): Provides remote Web
access to the switch via encrypted authentication paths between the
switch and management station clients capable of SSL/TLS operation.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......