10-2
Using Authorized IP Managers
Overview
Overview
Authorized IP Manager Features
The Authorized IP Managers feature uses IP addresses and masks to deter-
mine which stations (PCs or workstations) can access the switch through the
network. This covers access through the following means:
–
Telnet and other terminal emulation applications
–
The switch’s Web browser interface
–
SNMP (with a correct community name)
Also, when configured in the switch, the Authorized IP Managers feature takes
precedence over local passwords, , RADIUS, Port-Based Access
Control (802.1X), and Port Security. This means that the IP address of a
networked management device must be authorized before the switch will
attempt to authenticate the device by invoking other access security features.
If the Authorized IP Managers feature disallows access to the device, then
access is denied. Thus, with authorized IP managers configured, having the
correct passwords is not sufficient for accessing the switch through the
network unless the station attempting access is also included in the switch’s
Authorized IP Managers configuration.
You can use Authorized IP Managers along with other access security features
to provide a more comprehensive security fabric than if you use only one or
two security options. Refer to table 1-1, “Management Access Security Protec-
tion” (page 1-4) for a listing of access security features with the security
coverage they provide.
Feature
Default
Menu
CLI
Web
Listing (Showing) Authorized
Managers
n/a
page 10-5
page 10-6
page 10-9
Configuring Authorized IP
Managers
None
page 10-5
page 10-6
page 10-9
Building IP Masks
n/a
page 10-9
page 10-9
page 10-9
Operating and Troubleshooting
Notes
n/a
page 10-12 page 10-12 page 10-12
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......