Chapter 5: Secure Switch Management - Nortel Web OS Switch Software Application Manual

Switch software
Table of Contents

Advertisement

C
HAPTER
Secure Switch Management
This chapter discusses the use of secure tunnels so that the data on the network is encrypted
and secured for messages between a remote administrator and the switch.
To limit access to the switch's Management Processor without having to configure filters for
each switch port, you can set a source IP address (or range) that will be allowed to connect to
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface
(BBI). This will also help prevent spoofing or attacks on the switch's TCP/IP stack. The fol-
lowing sections are addressed in this chapter:
n
"Setting Allowable Source IP Address Ranges" on page 100
n
"Secure Switch Management" on page 101
n
"RADIUS Authentication and Authorization" on page 103
n
"Secure Shell and Secure Copy" on page 107
n
"Port Mirroring" on page 113
212777-A, February 2002
5
99

Advertisement

Table of Contents
loading

This manual is also suitable for:

Web os 10.0

Table of Contents