Configuring Username and Password Security
Saving Security Credentials in a Config File
802.1X Port-Access Credentials
802.1X authenticator (port-access) credentials can be stored in a
configuration file. 802.1X
authenticator
credentials are used by a port to
authenticate supplicants requesting a point-to-point connection to the switch.
802.1X
supplicant
credentials are used by the switch to establish a point-to
point connection to a port on another 802.1X-aware switch. Only 802.1X
authenticator credentials are stored in a configuration file. For information
about how to use 802.1X on the switch both as an authenticator and a
supplicant, see “Configuring Port-Based and Client-Based Access Control
(802.1X)” in this guide.
The local password configured with the
password
command is no longer
accepted as an 802.1X authenticator credential. A new configuration
command (
password port-access)
is introduced to configure the local operator
username and password used as 802.1X authentication credentials for access
to the switch.
The
password port-access
values are now configured separately from the
manager and operator passwords configured with the
password manager
and
password operator
commands and used for management access to the switch.
For information on the new
password
command syntax, see “Password
Command Options” on page 2-13.
After you enter the complete
password port-access
command syntax, the
password is set. You are not prompted to enter the password a second time.
Encryption Key Authentication
You can use servers to authenticate users who request access to a
switch through Telnet (remote) or console (local) sessions. uses an
authentication hierarchy consisting of:
■
Remote passwords assigned in a server
■
Local manager and operator passwords configured on the switch.
When you configure , the switch first tries to contact a designated
server for authentication services. If the switch fails to connect to
any server, it defaults to its own locally assigned passwords for
authentication control if it has been configured to do so.
For improved security, you can configure a global or server-specific
encryption key that encrypts data in packets transmitted between
a switch and a RADIUS server during authentication sessions. The key
configured on the switch must match the encryption key configured in each
2-15
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...