10-3
Using Authorized IP Managers
Access Levels
Configuration Options
You can configure:
■
Up to 10 authorized manager
addresses
, where each address applies
to either a single management station or a group of stations
■
Manager or Operator access privileges (for Telnet, SNMPv1, and
SNMPv2c access only)
C a u t i o n
Configuring Authorized IP Managers does not protect access to the switch
through a modem or direct connection to the Console (RS-232) port. Also, if
an authorized station "spoofs" an authorized IP address, it can gain manage-
ment access to the switch even though a duplicate IP address condition exists.
For these reasons, you should enhance your network’s security by keeping
physical access to the switch restricted to authorized personnel, using the
username/password and other security features available in the switch, and
preventing unauthorized access to data on your management stations.
Access Levels
The Authorized IP Manager feature can assign an access level to stations using
Telnet, SNMPv1, or SNMPv2c for switch access. The access level the switch
allows for authorized stations using SSH, SNMPv3, or the web browser
interface is determined by the access application itself, and not by the Autho-
rized IP Manager feature. The IP Authorized list does not enforce access rights
because SSH, the Web Agent (SSL) and SNMPv3 have much better access
control mechanisms than an IP address alone. For example, SNMPv3 has
access control down to the user level as well as authentication and encryption
for data integrity.
For each authorized manager address using Telnet, SNMPv1, or SNMPv2c, you
can configure either of these access levels:
■
Manager:
Enables full access to all web browser and console inter-
face screens for viewing, configuration, and all other operations
available in these interfaces.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......