Secure switch management, Chapter 5: secure switch management 99, Chapter 5, “secure switch management – Nortel Networks WEB OS 212777 User Manual

Page 99

Advertising
background image

212777-A, February 2002

99

C

HAPTER

5

Secure Switch Management

This chapter discusses the use of secure tunnels so that the data on the network is encrypted
and secured for messages between a remote administrator and the switch.

To limit access to the switch’s Management Processor without having to configure filters for
each switch port, you can set a source IP address (or range) that will be allowed to connect to
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface
(BBI). This will also help prevent spoofing or attacks on the switch’s TCP/IP stack. The fol-
lowing sections are addressed in this chapter:

n

“Setting Allowable Source IP Address Ranges” on page 100

n

“Secure Switch Management” on page 101

n

“RADIUS Authentication and Authorization” on page 103

n

“Secure Shell and Secure Copy” on page 107

n

“Port Mirroring” on page 113

Advertising