Configuring Device Security; Configuring Authentication Methods; Defining Access Profiles - HP BladeSystem bc2000 - Blade PC User Manual

For the bladesystem pc blade switch
Hide thumbs Also See for BladeSystem bc2000 - Blade PC:
Table of Contents

Advertisement

This section provides access to security pages that contain fields for setting security parameters
for ports, device management methods, users, and server security. This section contains the
following topics:

Configuring Authentication Methods

Configuring Network Security
Configuring Authentication Methods
This section provides information for configuring device authentication methods. This section
includes the topics:

Defining Access Profiles

Defining Profile Rules
Defining Authentication Profiles
Mapping Authentication Methods
Defining RADIUS Settings
Defining TACACS+ Authentication
Configuring Passwords
Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions
can be limited to user groups. User groups are defined for interfaces according to IP addresses or
IP subnets. Access profiles contain management methods for accessing and managing the device.
The device management methods include:
All
Telnet
Secure Telnet (SSH)
HTTP
SNMP
HTTPS
Management access to different management methods may differ between user groups. For
example, User Group 1 can access the switch module only via an HTTPS session, while User
Group 2 can access the switch module using both HTTPS and Telnet sessions. The Access
Profiles page contains the currently configured access profiles and their activity status.
Assigning an access profile to an interface denies access using other interfaces. If an access
profile is assigned to any interface, the device can be accessed by all interfaces.
Embedded Web System User Guide

Configuring Device Security

www.hp.com
4
4-1

Advertisement

Table of Contents
loading

Table of Contents