1-2
Getting Started
Introduction
Introduction
This
Access Security Guide
describes how to use ProCurve’s switch security
features to protect access to your switch. This guide is intended to support
the following switches:
■
ProCurve Switch 2510G
For an overview of other product documentation for the above switches, refer
to “Product Documentation” on page xi.
You can download a copy from the ProCurve Networking Website. Visit
http://www.procurve.com/manuals
, then select your switch product.
Overview of Access Security Features
The access security features covered in this guide include:
■
Local Manager and Operator Passwords
(page 2-1): Control
access and privileges for the CLI, menu, and Web browser interfaces.
■
Authentication
(page 4-1): Uses an authentication appli-
cation on a server to allow or deny access to a switch.
■
RADIUS Authentication and Accounting
(page 5-1): Like
, uses an authentication application on a central server to
allow or deny access to the switch. RADIUS also provides accounting
services for sending data about user activity and system events to a
RADIUS server.
■
Secure Shell (SSH) Authentication
(page 6-1): Provides
encrypted paths for remote access to switch management functions.
■
Secure Socket Layer (SSL)
(page 7-1): Provides remote Web
access to the switch via encrypted authentication paths between the
switch and management station clients capable of SSL/TLS operation.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......