9-8
Using Passwords and To Protect Against Unauthorized Access
Authentication for Central Control of Switch Access Security
Usi
n
g P
a
ssword
s a
nd
T
A
CA
CS
+
Authentication for Central
Control of Switch Access Security
Features
authentication enables you to use a central server to allow or deny
access to the Switch 4108GL (and other TACACS-aware devices) in your
network. This means that you can use a central database to create multiple
unique username/password sets with associated privilege levels for use by
individuals who have reason to access the switch from either the switch’s
console port (local access) or Telnet (remote access).
Figure 9-4. Example of Operation
Feature
Default
Menu
CLI
Web
view the switch’s authentication configuration
n/a
—
page 14
—
view the switch’s server contact
configuration
n/a
—
page 15
—
configure the switch’s authentication methods
disabled
—
page 16
—
configure the switch to contact server(s) disabled
—
page 19
—
B
Switch 4108GL
Configured for
Operation
Terminal "
A
" Directly
Accessing the Switch
Via Switch’s Console
Port
Terminal "
B
" Remotely Accessing The Switch Via Telnet
A
Primary
Server
The switch passes the login
requests from terminals A and B
to the server for
authentication. The
server determines whether to
allow access to the switch and
what privilege level to allow for
a given access request.
Access Request
A1 - A4
: Path for Request from
Terminal A (Through Console Port)
TACACS Server
B1 - B4:
Path for Request from
Response Terminal B (Through Telnet)
B1
A2 or
B2
A3 or
B3
B4
A1
A4
Summary of Contents for ProCurve 4108gl Bundle
Page 1: ...hp procurve switch 4108gl management and configuration guide www hp com go hpprocurve ...
Page 2: ......
Page 40: ...2 16 Using the Menu Interface Where To Go From Here Using the Menu Interface ...
Page 154: ...8 24 Time Protocols SNTP Messages in the Event Log Time Protocols ...
Page 350: ...14 44 Port Based Virtual LANs VLANs and GVRP GVRP Port Based Virtual LANs VLANs and GVRP ...
Page 383: ...16 13 Spanning Tree Protocol STP How STP Operates Spanning Tree Protocol STP ...
Page 384: ...16 14 Spanning Tree Protocol STP How STP Operates Spanning Tree Protocol STP ...
Page 442: ...18 30 Troubleshooting Restoring a Flash Image Troubleshooting ...
Page 466: ...B 6 MAC Address Management Determining MAC Addresses MAC Address Management ...
Page 470: ......
Page 481: ...Index 11 Index write memory effect on menu interface 2 13 X Xmodem OS download A 6 ...
Page 482: ......