EasyManuals Logo

HPE FlexNetwork 5130 EI Series Fundamentals Configuration Guide

HPE FlexNetwork 5130 EI Series
183 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
ii
Accessing the device through SNMP ···························································· 43
Controlling user access ················································································· 44
FIPS compliance ·············································································································································· 44
Controlling Telnet/SSH logins ·························································································································· 44
Configuration procedures ························································································································· 44
Configuration example ····························································································································· 44
Controlling Web logins ····································································································································· 45
Configuring source IP-based Web login control ······················································································· 45
Logging off online Web users ··················································································································· 45
Web login control configuration example ································································································· 46
Controlling SNMP access ································································································································ 46
Configuration procedure ··························································································································· 46
Configuration example ····························································································································· 47
Configuring command authorization ················································································································ 48
Configuration procedure ··························································································································· 48
Configuration example ····························································································································· 49
Configuring command accounting ··················································································································· 51
Configuration procedure ··························································································································· 51
Configuration example ····························································································································· 52
Configuring RBAC ························································································· 54
Overview ·························································································································································· 54
Permission assignment ···························································································································· 54
Assigning user roles ································································································································· 56
FIPS compliance ·············································································································································· 57
Configuration task list ······································································································································· 57
Creating user roles ··········································································································································· 57
Configuring user role rules ······························································································································· 57
Configuration restrictions and guidelines ································································································· 58
Configuration procedure ··························································································································· 58
Configuring feature groups ······························································································································ 59
Configuring resource access policies ·············································································································· 59
Configuring the interface policy of a user role ·························································································· 59
Configuring the VLAN policy of a user role ······························································································ 60
Assigning user roles ········································································································································· 60
Enabling the default user role feature ······································································································ 60
Assigning user roles to remote AAA authentication users ······································································· 61
Assigning user roles to local AAA authentication users ··········································································· 61
Assigning user roles to non-AAA authentication users on user lines ······················································· 62
Configuring temporary user role authorization ································································································· 62
Configuration guidelines ··························································································································· 62
Configuring user role authentication ········································································································ 64
Obtaining temporary user role authorization ···························································································· 64
Displaying and maintaining RBAC settings ······································································································ 65
RBAC configuration examples ························································································································· 65
RBAC configuration example for local AAA authentication users ···························································· 65
RBAC configuration example for RADIUS authentication users ······························································ 67
RBAC temporary user role authorization configuration example (HWTACACS authentication) ·············· 69
RBAC temporary user role authorization configuration example (RADIUS authentication) ····················· 74
Troubleshooting RBAC ···································································································································· 77
Local users have more access permissions than intended ······································································ 77
Login attempts by RADIUS users always fail ··························································································· 77
Configuring FTP ···························································································· 78
FIPS compliance ·············································································································································· 78
Using the device as an FTP server ·················································································································· 78
Configuring basic parameters ·················································································································· 78
Configuring authentication and authorization ··························································································· 79
Manually releasing FTP connections ······································································································· 80
Displaying and maintaining the FTP server ····························································································· 80

Table of Contents

Other manuals for HPE FlexNetwork 5130 EI Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HPE FlexNetwork 5130 EI Series and is the answer not in the manual?

HPE FlexNetwork 5130 EI Series Specifications

General IconGeneral
BrandHPE
ModelFlexNetwork 5130 EI Series
CategorySwitch
LanguageEnglish

Related product manuals