Secure switch management, Chapter 5: secure switch management 99, Chapter 5, “secure switch management – Nortel Networks WEB OS 212777 User Manual
Page 99

212777-A, February 2002
99
C
HAPTER
5
Secure Switch Management
This chapter discusses the use of secure tunnels so that the data on the network is encrypted
and secured for messages between a remote administrator and the switch.
To limit access to the switch’s Management Processor without having to configure filters for
each switch port, you can set a source IP address (or range) that will be allowed to connect to
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface
(BBI). This will also help prevent spoofing or attacks on the switch’s TCP/IP stack. The fol-
lowing sections are addressed in this chapter:
n
“Setting Allowable Source IP Address Ranges” on page 100
n
“Secure Switch Management” on page 101
n
“RADIUS Authentication and Authorization” on page 103
n
“Secure Shell and Secure Copy” on page 107
n