Getting Started; Introduction; Overview Of Access Security Features - HP procurve 5300xl Series Access Security Manual

Hide thumbs Also See for procurve 5300xl Series:
Table of Contents

Advertisement

Getting Started

Introduction

1-2

Introduction

This Access Security Guide is intended for use with the HP Procurve Switch
Series 5300XL devices.
The Product Documentation CD-ROM shipped with the switch includes this
guide. You can also download the latest version from the HP ProCurve
website. (Refer to "Getting Documentation From the Web" on page 1-8.)

Overview of Access Security Features

Local Manager and Operator Passwords (page 2-1): Control access
and privileges for the CLI, menu, and web browser interfaces.
Web and MAC Authentication (page 3-1): Provides user or device
authentication through a RADIUS server without requiring the client to
use 802.1x supplicant software.
TACACS+ Authentication (page 4-1): Uses an authentication applica­
tion on a server to allow or deny access to Series 5300XL switch.
RADIUS Authentication and Accounting (page 5-1): Uses RADIUS
authentication on a central server to allow or deny access to the switch.
RADIUS also provides accounting services for sending data about user
activity and system events to a RADIUS server.
Secure Shell (SSH) Authentication (page 6-1): Provides encrypted
paths for remote access to switch management functions.
Secure Socket Layer (SSL) (page 7-1): Provides remote web access to
the switch via encrypted authentication paths between the switch and
management station clients capable of SSL/TLS operation.
Port-Based Access Control (802.1x) (page 8-1): On point-to-point
connections, enables the switch to allow or deny traffic between a port
and an 802.1x-aware device (supplicant) attempting to access the switch.
Also enables the switch to operate as a supplicant for connections to other
802.1x-aware switches.
Port Security (page 9-1): Enables a switch port to maintain a unique list
of MAC addresses defining which specific devices are allowed to access
the network through that port. Also enables a port to detect, prevent, and
log access attempts by unauthorized devices.
MAC Lockdown (page 9-18): Permanently assigns a device MAC
address to a specific port on the switch to restrict a client device to a
specific port.

Advertisement

Table of Contents
loading

Table of Contents