Authentication
Overview
Overview
Feature
Default
Menu
CLI
Web
view the switch’s authentication configuration
n/a
—
—
view the switch’s server contact
n/a
—
page 4-
—
configuration
configure the switch’s authentication methods
disabled
—
page 4-
—
configure the switch to contact server(s) disabled
—
—
authentication enables you to use a central server to allow or deny
access to the switches covered in this guide (and other TACACS-aware
devices) in your network. This means that you can use a central database to
create multiple unique username/password sets with associated privilege
levels for use by individuals who have reason to access the switch from either
the switch’s console port (local access) or Telnet (remote access).
B
Switch Configured for
Operation
Terminal “
A
” Directly
Accessing the Switch
Via Switch’s Console
Port
Terminal “
B
” Remotely Accessing The Switch Via Telnet
A
Primary
Server
The switch passes the login
requests from terminals A and B
to the server for
authentication. The
server determines whether to
allow access to the switch and
what privilege level to allow for
a given access request.
Access Request
A1 - A4
: Path for Request from
Terminal A (Through Console Port)
TACACS Server
B1 - B4:
Path for Request from
Response
Terminal B (Through Telnet)
B1
A2 or
B2
A3 or
B3
B4
A1
A4
Figure 4-1. Example of Operation
in the switches covered in this guide manages authentication of
logon attempts through either the Console port or Telnet. uses an
authentication hierarchy consisting of (1) remote passwords assigned in a
server and (2) local passwords configured on the switch. That is,
with configured, the switch first tries to contact a designated
4-2
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......