EasyManua.ls Logo

HP 4108GL - 9 Using Passwords and Tacacs+ to Protect against Unauthorized Access; Contents

HP 4108GL
483 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9-1
Using Passwords and
TACACS+
9
Using Passwords and TACACS+ To Protect Against
Unauthorized Access
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Configuring Username and Password Security . . . . . . . . . . . . . . . . . . 9-3
Menu: Configuring Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 9-6
Web: Configuring User-Names and Passwords . . . . . . . . . . . . . . . . . . . 9-7
TACACS+ Authentication for Central Control of Switch
Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Terminology Used in TACACS Applications: . . . . . . . . . . . . . . . . . . . . 9-9
General System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10
General Authentication Setup Procedure . . . . . . . . . . . . . . . . . . . . . . 9-11
Configuring TACACS+ on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
Viewing the Switchs Current Authentication Configuration . . . 9-14
Viewing the Switchs Current TACACS+ Server Contact
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-15
Configuring the Switchs Authentication Methods . . . . . . . . . . . 9-16
Configuring the Switchs TACACS+ Server Access . . . . . . . . . . . 9-19
How Authentication Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
General Authentication Process Using a TACACS+ Server . . . . 9-24
Local Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-25
Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
General Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
Encryption Options in the Switch . . . . . . . . . . . . . . . . . . . . . . . . . 9-27
Controlling Web Browser Interface Access When Using TACACS+
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28
Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Troubleshooting TACACS+ Operation . . . . . . . . . . . . . . . . . . . . . . . . . 9-29

Table of Contents

Related product manuals