Overview of access security features, Overview of access security features -3 – HP 2800 User Manual
Page 15
Getting Started
Overview of Access Security Features
Overview of Access Security Features
■
Local Manager and Operator Passwords
(page 2-1): Control
access and privileges for the CLI, menu, and web browser interfaces.
■
TACACS+ Authentication
(page 4-1): Uses an authentication appli
cation on a server to allow or deny access to a switch.
■
RADIUS Authentication and Accounting
TACACS+, uses an authentication application on a central server to
allow or deny access to the switch. RADIUS also provides accounting
services for sending data about user activity and system events to a
RADIUS server.
■
Secure Shell (SSH) Authentication
encrypted paths for remote access to switch management functions.
■
Secure Socket Layer (SSL)
(page 7-1): Provides remote web access
to the switch via encrypted authentication paths between the switch
and management station clients capable of SSL/TLS operation.
■
Port-Based Access Control (802.1X)
(page 8-1): On point-to-point
connections, enables the switch to allow or deny traffic between a
port and an 802.1X-aware device (supplicant) attempting to access
the switch. Also enables the switch to operate as a supplicant for
connections to other 802.1X-aware switches.
■
Port Security
(page 9-1): Enables a switch port to maintain a unique
list of MAC addresses defining which specific devices are allowed to
access the network through that port. Also enables a port to detect,
prevent, and log access attempts by unauthorized devices.
■
Traffic/Security Filters
(page 10-1 ): Source-Port filtering enhances
in-band security by enabling outbound destination ports on the switch
to forward or drop traffic from designated source ports (within the
same VLAN).
■
Authorized IP Managers
(page 11-1): Allows access to the switch
by a networked device having an IP address previously configured in
the switch as "authorized".
HP recommends that you use local passwords together with your switch’s
other security features to provide a more comprehensive security fabric than
if you use only local passwords. For an overview, refer to Table 1-1.
1-3