Authentication
General System Requirements
General System Requirements
To use authentication, you need the following:
■
A server application installed and configured on one or more
servers or management stations in your network. (There are several
software packages available.)
■
A switch configured for authentication, with access to one or
more servers.
Notes
The effectiveness of security depends on correctly using your
server application. For this reason, ProCurve recommends that you
thoroughly test all configurations used in your network.
TACACS-aware ProCurve switches include the capability of configuring
multiple backup servers. ProCurve recommends that you use a
server application that supports a redundant backup installation.
This allows you to configure the switch to use a backup server if it
loses access to the first-choice server.
does not affect web browser interface access. Refer to “Controlling
Web Browser Interface Access When Using Authentication” on
page 4-27.
General Authentication Setup Procedure
It is important to test the service before fully implementing it.
Depending on the process and parameter settings you use to set up and test
authentication in your network, you could accidentally lock all
users, including yourself, out of access to a switch. While recovery is simple,
it may pose an inconvenience that can be avoided.To prevent an unintentional
lockout on the switch, use a procedure that configures and tests
protection for one access type (for example, Telnet access), while keeping the
other access type (console, in this case) open in case the Telnet access fails
due to a configuration problem. The following procedure outlines a general
setup procedure.
4-5
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......