EasyManua.ls Logo

HP 4108GL - Page 11

HP 4108GL
483 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ix
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Configuring Username and Password Security . . . . . . . . . . . . . . . . . . 9-3
Menu: Configuring Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 9-6
Web: Configuring User-Names and Passwords . . . . . . . . . . . . . . . . . . . 9-7
TACACS+ Authentication for Central Control of Switch Access Security
9-8
Terminology Used in TACACS Applications: . . . . . . . . . . . . . . . . . . . . 9-9
General System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10
General Authentication Setup Procedure . . . . . . . . . . . . . . . . . . . . . . 9-11
Configuring TACACS+ on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
How Authentication Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
Controlling Web Browser Interface Access When Using TACACS+ Authentication
9-28
Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Troubleshooting TACACS+ Operation . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Using Authorized IP Managers for Increased Management
Security
Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Using Authorized IP Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 10-5
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 10-7
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 10-8
Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . 10-10
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
Operating and Troubleshooting Notes . . . . . . . . . . . . . . . . . . . . . . . . 10-13
Optimizing Port Usage Through Traffic Control and Port
Trunking
Chapter Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1

Table of Contents

Related product manuals