2-17
Configuring Username and Password Security
Front-Panel Security
Figure 2-11. Example of the Steps for Disabling Password-Recovery
Password Recovery Process
If you have lost the switch’s manager username/password, but
password
-
recovery
is enabled, then you can use the Password Recovery Process to gain
management access to the switch with an alternate password supplied by
ProCurve.
N o t e
If you have disabled
password-recovery
, which locks out the ability to recover
a manager username/password pair on the switch, then the only way to
recover from a lost manager username/password pair is to use the
Reset+Clear button combination described under “Restoring the Factory
Default Configuration” on page 2-9. This can disrupt network operation and
make it necessary to temporarily disconnect the switch from the network to
prevent unauthorized access and other problems while it is being reconfig-
ured.
To use the
password-recovery
option to recover a lost password:
1.
Note the switch’s base MAC address. It is shown on the label located on
the upper right front corner of the switch.
2.
Contact your ProCurve Customer Care Center for further assistance.
Using the switch’s MAC address, the ProCurve Customer Care Center will
generate and provide a “one-time use” alternate password you can use
with the to gain management access to the switch. Once you gain access,
you can configure a new, known password.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......