Overview of access security features, Overview of access security features -3 – HP 2800 User Manual

Page 15

Advertising
background image

Getting Started

Overview of Access Security Features

Overview of Access Security Features

Local Manager and Operator Passwords

(page 2-1): Control

access and privileges for the CLI, menu, and web browser interfaces.

TACACS+ Authentication

(page 4-1): Uses an authentication appli­

cation on a server to allow or deny access to a switch.

RADIUS Authentication and Accounting

(page 5-1): Like

TACACS+, uses an authentication application on a central server to
allow or deny access to the switch. RADIUS also provides accounting
services for sending data about user activity and system events to a
RADIUS server.

Secure Shell (SSH) Authentication

(page 6-1): Provides

encrypted paths for remote access to switch management functions.

Secure Socket Layer (SSL)

(page 7-1): Provides remote web access

to the switch via encrypted authentication paths between the switch
and management station clients capable of SSL/TLS operation.

Port-Based Access Control (802.1X)

(page 8-1): On point-to-point

connections, enables the switch to allow or deny traffic between a
port and an 802.1X-aware device (supplicant) attempting to access
the switch. Also enables the switch to operate as a supplicant for
connections to other 802.1X-aware switches.

Port Security

(page 9-1): Enables a switch port to maintain a unique

list of MAC addresses defining which specific devices are allowed to
access the network through that port. Also enables a port to detect,
prevent, and log access attempts by unauthorized devices.

Traffic/Security Filters

(page 10-1 ): Source-Port filtering enhances

in-band security by enabling outbound destination ports on the switch
to forward or drop traffic from designated source ports (within the
same VLAN).

Authorized IP Managers

(page 11-1): Allows access to the switch

by a networked device having an IP address previously configured in
the switch as "authorized".

HP recommends that you use local passwords together with your switch’s
other security features to provide a more comprehensive security fabric than
if you use only local passwords. For an overview, refer to Table 1-1.

1-3

Advertising
This manual is related to the following products: