4-2
Authentication
Configuring on the Switch
Overview
(Terminal Access Controller Access Control ) authentica-
tion enables you to use a central server to allow or deny access to the switch
(and other TACACS-aware devices) in your network. This means that you can
use a central database to create multiple unique username/password sets with
associated privilege levels for use by individuals who have reason to access
the switch either locally (from the switch’s console port) or remotely (Telnet
or SSH).
Figure 4-1. Example of Operation
in the switch manages authentication of logon attempts through
either the Console port or remote connection (Telnet, SSH). uses
an authentication hierarchy consisting of (1) remote passwords assigned in a
server and (2) local passwords configured on the switch. That is,
Feature
Default
Menu
CLI
Web
view the switch’s authentication configuration
n/a
—
page 4-9 —
view the switch’s server contact
configuration
n/a
—
page
4-10
—
configure the switch’s authentication methods
disabled
—
page
4-11
—
configure the switch to contact server(s) disabled
—
page
4-18
—
B
ProCurve Switch
Configured for
Operation
Terminal “
A
” Directly
Accessing the Switch
Via Switch’s Console
Port
Terminal “
B
” Remotely Accessing The Switch Via Telnet
A
Primary
Server
The switch passes the login
requests from terminals A and B
to the server for
authentication. The
server determines whether to
allow access to the switch and
what privilege level to allow for
a given access request.
Access Request
A1 - A4
: Path for Request from
Terminal A (Through Console Port)
TACACS Server
B1 - B4:
Path for Request from
Response Terminal B (Through Telnet)
B1
A2 or
B2
A3 or
B3
B4
A1
A4
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......