4-6
Authentication
Configuring on the Switch
other access type (console, in this case) open in case the remote (Telnet/SSH)
access fails due to a configuration problem. The following procedure outlines
a general setup procedure.
N o t e
If a complete access lockout occurs on the switch as a result of a
configuration, see “Troubleshooting Operation” in the Trouble-
shooting chapter of the
Management and Configuration Guide
for your
switch.
1.
Familiarize yourself with the requirements for configuring your
server application to respond to requests from a switch. (Refer
to the documentation provided with the server software.) This
includes knowing whether you need to configure an encryption key. (See
“Using the Encryption Key” on page 4-26.)
2.
Determine the following:
3.
Plan and enter the server configuration needed to support
operation for Telnet access (login and enable) to the switch.
This includes the username/password sets for logging in at the Operator
(read-only) privilege level and the sets for logging in at the Manager (read/
write) privilege level.
• The IP address(es) of the
server(s) you want the switch to use
for authentication. If you will use
more than one server, determine
which server is your first-choice for
authentication services.
• The encryption key, if any, for
allowing the switch to communicate
with the server. You can use either a
global key or a server-specific key,
depending on the encryption
configuration in the
server(s).
• The number of log-in attempts you
will allow before closing a log-in
session. (Default: 3)
• The period you want the switch to
wait for a reply to an authentication
request before trying another
server.
• The username/password pairs you
want the server to use for
controlling access to the switch.
• The privilege level you want for
each username/password pair
administered by the
server for controlling access to the
switch.
• The username/password pairs you
want to use for local authentication
(one pair each for Operator and
Manager levels).
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......