5-30
Authentication
Operating Notes
Operating Notes
■
If you configure Authorized IP Managers on the switch, it is not
necessary to include any devices used as servers in the
authorized manager list. That is, authentication traffic between a
server and the switch is not subject to Authorized IP
Manager controls configured on the switch. Also, the switch does not
attempt authentication for a management station that the
Authorized IP Manager list excludes because, independent of
, the switch already denies access to such stations.
■
When is not enabled on the switch—or when the switch’s
only designated servers are not accessible— setting a local
Operator password without also setting a local Manager password
does not protect the switch from manager-level access by unauthor-
ized persons.
■
When using the
copy
command to transfer a configuration to a TFTP
server, any optional, server-specific and global encryption keys (page
5-17) in the TACACS configuration will not be included in the trans-
ferred file. Otherwise, a security breach could occur, allowing access
to the username/password information.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......