1-4
Getting Started
Overview of Access Security Features
Table 1-1.
Management Access Security Protection
General Switch Traffic Security Guidelines
Where the switch is running multiple security options, it implements network
traffic security based on the OSI (Open Systems Interconnection model)
precedence of the individual options, from the lowest to the highest. The
following list shows the order in which the switch implements configured
security features on traffic moving through a given port.
1.
Disabled/Enabled physical port
2.
MAC lockout (applies to all ports on the switch)
3.
MAC lockdown
4.
Port security
5.
Authorized IP Managers
6.
Application features at higher levels in the OSI model, such as SSH
(The above list does not address the mutually exclusive relationship that
exists among some security features.)
Security Feature
Offers Protection Against Unauthorized Client Access to
Switch Management Features
Offers Protection
Against
Unauthorized Client
Access to the
Network
Connection
Telnet
SNMP
(Net Mgmt)
Web
Browser
SSH
Client
Local Manager and Operator
Usernames and Passwords
1
PtP:
Yes
No
Yes
Yes
No
Remote:
Yes
No
Yes
Yes
No
PtP:
Yes
No
No
Yes
No
Remote:
Yes
No
No
Yes
No
RADIUS
PtP:
Yes
No
No
Yes
No
Remote:
Yes
No
No
Yes
No
SSH
Ptp:
Yes
No
No
Yes
No
Remote:
Yes
No
No
Yes
No
SSL
Ptp:
No
No
Yes
No
No
Remote:
No
No
Yes
No
No
Port-Based Access Control (802.1X)
PtP:
Yes
Yes
Yes
Yes
Yes
Remote:
No
No
No
No
No
Port Security (MAC address)
PtP:
Yes
Yes
Yes
Yes
Yes
Remote:
Yes
Yes
Yes
Yes
Yes
Authorized IP Managers
PtP:
Yes
Yes
Yes
Yes
No
Remote:
Yes
Yes
Yes
Yes
No
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......