Authentication
General System Requirements
General System Requirements
To use authentication, you need the following:
■
A server application installed and configured on one or
more servers or management stations in your network. (There are
several software packages available.)
■
A switch configured for authentication, with access to one
or more servers.
N o t e s
The effectiveness of security depends on correctly using your
server application. For this reason, ProCurve recommends that you
thoroughly test all configurations used in your network.
TACACS-aware ProCurve switches include the capability of configuring
multiple backup servers. ProCurve recommends that you use a
server application that supports a redundant backup installation.
This allows you to configure the switch to use a backup server if it
loses access to the first-choice server.
does not affect web browser interface access. Refer to “Controlling
Web Browser Interface Access When Using Authentication” on
page 5-24.
General Authentication Setup Procedure
It is important to test the service before fully implementing it.
Depending on the process and parameter settings you use to set up and test
authentication in your network, you could accidentally lock all
users, including yourself, out of access to a switch. While recovery is simple,
it may pose an inconvenience that can be avoided.To prevent an unintentional
lockout on the switch, use a procedure that configures and tests
protection for one access type (for example, Telnet access), while keeping the
5-5
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......