This section provides access to security pages that contain fields for setting security parameters
for ports, device management methods, users, and server security. This section contains the
following topics:
■
Configuring Authentication Methods
■
Configuring Network Security
Configuring Authentication Methods
This section provides information for configuring device authentication methods. This section
includes the topics:
■
Defining Access Profiles
■
Defining Profile Rules
■
Defining Authentication Profiles
■
Mapping Authentication Methods
■
Defining RADIUS Settings
■
Defining TACACS+ Authentication
■
Configuring Passwords
Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions
can be limited to user groups. User groups are defined for interfaces according to IP addresses or
IP subnets. Access profiles contain management methods for accessing and managing the device.
The device management methods include:
■
All
■
Telnet
■
Secure Telnet (SSH)
■
HTTP
■
SNMP
■
HTTPS
Management access to different management methods may differ between user groups. For
example, User Group 1 can access the switch module only via an HTTPS session, while User
Group 2 can access the switch module using both HTTPS and Telnet sessions. The Access
Profiles page contains the currently configured access profiles and their activity status.
Assigning an access profile to an interface denies access using other interfaces. If an access
profile is assigned to any interface, the device can be accessed by all interfaces.
Embedded Web System User Guide
Configuring Device Security
www.hp.com
4
4-1