5-4
Authentication
General System Requirements
General System Requirements
To use authentication, you need the following:
■
A server application installed and configured on one or
more servers or management stations in your network. (There are
several software packages available.)
■
A switch configured for authentication, with access to one
or more servers.
N o t e s
The effectiveness of security depends on correctly using your
server application. For this reason, HP recommends that you
thoroughly test all configurations used in your network.
TACACS-aware HP switches include the capability of configuring multiple
backup servers. HP recommends that you use a server
application that supports a redundant backup installation. This allows you to
configure the switch to use a backup server if it loses access to the
first-choice server.
does not affect WebAgent access. Refer to “Controlling WebAgent
Access When Using Authentication” on page 5-28.
General Authentication Setup Procedure
It is important to test the service before fully implementing it.
Depending on the process and parameter settings you use to set up and test
authentication in your network, you could accidentally lock all
users, including yourself, out of access to a switch. While recovery is simple,
it may pose an inconvenience that can be avoided.To prevent an unintentional
lockout on the switch, use a procedure that configures and tests
protection for one access type (for example, Telnet access), while keeping the
other access type (console, in this case) open in case the Telnet access fails
due to a configuration problem. The following procedure outlines a general
setup procedure.
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......