Controlling Management Access
171
What Are the Recommendations for Management Security?
Selecting the authentication policy for a network is very important. In large
deployments, many administrators prefer to use a RADIUS or
server because it allows the authentication policy to be applied system wide
with little administrative effort. Additional recommendations for
management security include:
• Require strong passwords
• Disable factory-delivered default accounts
• Enable password lockout
• Configure user ACLs to protect administrative access to the network.
What Is an Authentication Profile?
An authentication profile specifies which authentication method or methods
to use to authenticate a user who attempts to access the switch management
interface. The authentication method can be one or more of the following:
• ENABLE—Uses the enable password for authentication.
• IAS—Uses the Internal Authentication Server database for 801X port-
based authentication.
• LINE-—Uses the Line password for authentication.
• LOCAL— Uses the ID and password in the Local User Database for
authentication.
• RADIUS-—Sends the user's ID and password will be authenticated using
the RADIUS server instead of locally
• — Sends the user's ID and password to the configured
server to be authenticated.
• NONE-—No authentication is used.
You can use the same Authentication Profile for all access types, or select or
create a variety of profiles based on how a user attempts to access the switch
management interface. Profiles can be applied to each of the following access
types:
• Login—Autnenticates all attempts to login to the switch.
• Enable—Authenticates all attempts to enter Privileged EXEC mode (CLI
only).
Содержание PowerConnect 7024
Страница 134: ...134 Setting Basic Network Information ...
Страница 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Страница 348: ...348 Configuring SNMP ...
Страница 430: ...430 Monitoring Switch Traffic ...
Страница 444: ...444 Configuring iSCSI Optimization ...
Страница 521: ...Configuring 802 1X and Port Based Security 521 Figure 19 8 Configure Port Security Settings 5 Click Apply ...
Страница 538: ...538 Configuring 802 1X and Port Based Security ...
Страница 585: ...Configuring VLANs 585 Figure 21 5 Add Ports to VLAN 4 Click Apply 5 Verify that the ports have been added to the VLAN ...
Страница 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Страница 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Страница 658: ...658 Configuring the Spanning Tree Protocol ...
Страница 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Страница 780: ...780 Configuring Connectivity Fault Management ...
Страница 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Страница 818: ...818 Snooping and Inspecting Traffic ...
Страница 836: ...836 Configuring Link Aggregation ...
Страница 882: ...882 Configuring DHCP Server Settings ...
Страница 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Страница 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Страница 930: ...930 Configuring L2 and L3 Relay Features ...
Страница 1004: ...1004 Configuring OSPF and OSPFv3 ...
Страница 1044: ...1044 Configuring VRRP ...
Страница 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Страница 1064: ...1064 Configuring IPv6 Routing ...
Страница 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Страница 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Страница 1114: ...1114 Configuring Differentiated Services ...
Страница 1130: ...1130 Configuring Class of Service ...
Страница 1136: ...1136 Configuring Auto VoIP ...
Страница 1216: ...1216 Managing IPv4 and IPv6 Multicast ...