IronPort Systems 4108GL User Manual

Page 11

Advertising
background image

ix

Overview

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2

Configuring Username and Password Security

. . . . . . . . . . . . . . . . . . 9-3

Menu: Configuring Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5

CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 9-6

Web: Configuring User-Names and Passwords . . . . . . . . . . . . . . . . . . . 9-7

TACACS+ Authentication for Central Control of Switch Access Security

9-8

Terminology Used in TACACS Applications: . . . . . . . . . . . . . . . . . . . . 9-9

General System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10

General Authentication Setup Procedure . . . . . . . . . . . . . . . . . . . . . . 9-11

Configuring TACACS+ on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14

How Authentication Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24

Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26

Controlling

Web

Browser

Interface

Access

When

Using

TACACS+

Authentication

9-28

Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28

Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29

Troubleshooting TACACS+ Operation . . . . . . . . . . . . . . . . . . . . . . . . . 9-29

Using Authorized IP Managers for Increased Management
Security

Chapter Contents

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1

Overview

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2

Using Authorized IP Managers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4

Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5

Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 10-5

Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 10-7

CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 10-8

Web: Configuring IP Authorized Managers . . . . . . . . . . . . . . . . . . . . 10-10

Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10

Operating and Troubleshooting Notes . . . . . . . . . . . . . . . . . . . . . . . . 10-13

Optimizing Port Usage Through Traffic Control and Port
Trunking

Chapter Contents

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1

Advertising