Getting Started
Overview of Access Security Features
Overview of Access Security Features
■
Virus Throttling
(page 3-1): Enables notification of worm-like behavior
detected in inbound routed traffic and, depending on how you configure
the feature, also throttles or blocks such traffic. This feature also provides
a method for allowing legitimate, high connection-rate traffic from a given
host while still protecting your network from possibly malicious traffic
from other hosts.
■
Local Manager and Operator Passwords
and privileges for the CLI, menu, and web browser interfaces. Includes
front-panel security information that allows you to disable or re-enable
some of the functions of the Clear and the Reset buttons located on the
switch’s front panel.
■
Web and MAC Authentication
(page 4-1): Provides user or device
authentication through a RADIUS server without requiring the client to
use 802.1X supplicant software.
■
Authentication
(page 5-1): Uses an authentication applica
tion on a server to allow or deny access to the switch.
■
RADIUS Authentication and Accounting
(page 6-1): Uses RADIUS
authentication on a central server to allow or deny access to the switch.
RADIUS also provides accounting services for sending data about user
activity and system events to a RADIUS server.
■
Secure Shell (SSH) Authentication
(page 7-1): Provides encrypted
paths for remote access to switch management functions.
■
Secure Socket Layer (SSL)
(page 8-1): Provides remote web access to
the switch via encrypted authentication paths between the switch and
management station clients capable of SSL/TLS operation.
■
Traffic/Security Filters
(page 9-1): Enhance in-band security and
improve control over access to network resources by configuring static
filters to forward (the default action) or drop unwanted traffic. Configure
a traffic filter to either forward or drop all network traffic moving to
outbound (destination) ports and trunks (if any) on the switch.
■
Port-Based Access Control (802.1X)
(page 10-1): On point-to-point
connections, enables the switch to allow or deny traffic between a port
and an 802.1X-aware device (supplicant) attempting to access the switch.
Also enables the switch to operate as a supplicant for connections to other
802.1X-aware switches. Includes the option of allowing only the device
having the first MAC address detected by a port.
1-10
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......