9-1
Usi
n
g P
a
sswor
ds and
TA
C
A
CS+
9
Using Passwords and To Protect Against
Unauthorized Access
Contents
Overview
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Configuring Username and Password Security
. . . . . . . . . . . . . . . . . . 9-3
Menu: Configuring Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
CLI: Setting Manager and Operator Passwords . . . . . . . . . . . . . . . . . . . 9-6
Web: Configuring User-Names and Passwords . . . . . . . . . . . . . . . . . . . 9-7
Authentication for Central Control of Switch
Access Security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Terminology Used in TACACS Applications: . . . . . . . . . . . . . . . . . . . . 9-9
General System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10
General Authentication Setup Procedure . . . . . . . . . . . . . . . . . . . . . . 9-11
Configuring on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
Viewing the Switch’s Current Authentication Configuration . . . 9-14
Viewing the Switch’s Current Server Contact
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-15
Configuring the Switch’s Authentication Methods . . . . . . . . . . . 9-16
Configuring the Switch’s Server Access . . . . . . . . . . . 9-19
How Authentication Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
General Authentication Process Using a Server . . . . 9-24
Local Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-25
Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
General Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
Encryption Options in the Switch . . . . . . . . . . . . . . . . . . . . . . . . . 9-27
Controlling Web Browser Interface Access When Using
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28
Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Troubleshooting Operation . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Summary of Contents for ProCurve 4108gl Bundle
Page 1: ...hp procurve switch 4108gl management and configuration guide www hp com go hpprocurve ...
Page 2: ......
Page 40: ...2 16 Using the Menu Interface Where To Go From Here Using the Menu Interface ...
Page 154: ...8 24 Time Protocols SNTP Messages in the Event Log Time Protocols ...
Page 350: ...14 44 Port Based Virtual LANs VLANs and GVRP GVRP Port Based Virtual LANs VLANs and GVRP ...
Page 383: ...16 13 Spanning Tree Protocol STP How STP Operates Spanning Tree Protocol STP ...
Page 384: ...16 14 Spanning Tree Protocol STP How STP Operates Spanning Tree Protocol STP ...
Page 442: ...18 30 Troubleshooting Restoring a Flash Image Troubleshooting ...
Page 466: ...B 6 MAC Address Management Determining MAC Addresses MAC Address Management ...
Page 470: ......
Page 481: ...Index 11 Index write memory effect on menu interface 2 13 X Xmodem OS download A 6 ...
Page 482: ......