Security Overview
Access Security Features
Feature
Default
Setting
Security Guidelines
More Information and
Configuration Details
SSL
disabled
Secure Socket Layer (SSL) and Transport Layer Security
(TLS) provide remote Web browser access to the switch
via authenticated transactions and encrypted paths
between the switch and management station clients
Chapter 9, “Configuring
capable of SSL/TLS operation. The authenticated type
Secure Socket Layer (SSL)”
includes server certificate authentication with user
password authentication.
SNMP
public,
unrestricted
In the default configuration, the switch is open to access
by management stations running SNMP management
applications capable of viewing and changing the
settings and status data in the switch’s MIB
(Management Information Base). Thus, controlling
SNMP access to the switch and preventing
unauthorized SNMP access should be a key element of
your network security strategy.
“SNMP Security Guidelines”
on page 1-16
“Quick Start: Using the
Management Interface
Wizard” on page 1-11
Management and
Configuration Guide,
Chapter 14,
refer to the
section
“Using SNMP Tools
To Manage the Switch”
Authorized IP
none
This feature uses IP addresses and masks to determine
Chapter 15, “Using
Managers
whether to allow management access to the switch
Authorized IP Managers”
across the network through the following :
• Telnet and other terminal emulation applications
• The switch’s Web browser interface
• SNMP (with a correct community name)
Secure
Management
VLAN
disabled
This feature creates an isolated network for managing
the ProCurve switches that offer this feature. When a
secure management VLAN is enabled, CLI, Menu
interface, and Web browser interface access is
restricted to ports configured as members of the VLAN.
Advanced Traffic
Management Guide,
refer to
the chapter
“Static Virtual
LANs (VLANs)”
ACLs for
Management
Access
Protection
none
ACLs can also be configured to protect management
access by blocking inbound IP traffic that has the switch
itself as the destination IP address.
Chapter 10, “IPv4 Access
Control Lists (ACLs)”
Authentication
disabled
This application uses a central server to allow or deny
access to TACACS-aware devices in your network.
uses username/password sets with
associated privilege levels to grant or deny access
through either the switch’s serial (console) port or
remotely, with Telnet.
If the switch fails to connect to a server for the
necessary authentication service, it defaults to its own
locally configured passwords for authentication control.
allows both login (read-only) and enable
(read/write) privilege level access.
Chapter 5, “
Authentication”
1-5
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...