HP E3800-24G-PoE+-2SFP+ Access Security Manual page 36

Switch software
Hide thumbs Also See for E3800-24G-PoE+-2SFP+:
Table of Contents

Advertisement

Security Overview
Access Security Features
Feature
Default
Setting
RADIUS
disabled
Authentication
802.1X Access
none
Control
Web and MAC
none
Authentication
1-6
Security Guidelines
For each authorized client, RADIUS can be used to
authenticate operator or manager access privileges on
the switch via the serial port (CLI and Menu interface),
Telnet, SSH, and Secure FTP/Secure Copy (SFTP/SCP)
access methods.
This feature provides port-based or user-based
authentication through a RADIUS server to protect the
switch from unauthorized access and to enable the use
of RADIUS-based user profiles to control client access
to network services. Included in the general features are
the following:
• user-based access control supporting up to 32
authenticated clients per port
• port-based access control allowing authentication
by a single client to open the port
• switch operation as a supplicant for point-to-point
connections to other 802.1X-compliant HP switches
These options are designed for application on the edge
of a network to provide port-based security measures
for protecting private networks and the switch itself
from unauthorized access. Because neither method
requires clients to run any special supplicant software,
both are suitable for legacy systems and temporary
access situations where introducing supplicant
software is not an attractive option.
Both methods rely on using a RADIUS server for
authentication. This simplifies access security
management by allowing you to control access from a
master database in a single server. It also means the
same credentials can be used for authentication,
regardless of which switch or switch port is the current
access point into the LAN. Web authentication uses a
web page login to authenticate users for access to the
network. MAC authentication grants access to a secure
network by authenticating device MAC addresses for
access to the network.
More Information and
Configuration Details
Chapter 6, "RADIUS
Authentication and
Accounting"
Chapter 13 "Configuring
Port-Based and User-Based
Access Control (802.1X)"
Chapter 4, "Web and MAC
Authentication"

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents