Advanced Configuration; Security Management And Password Configuration; Configuring Security Passwords Introduction - HP BladeSystem bc2000 - Blade PC Installation Manual

Bladesystem pc blade switch
Hide thumbs Also See for BladeSystem bc2000 - Blade PC:
Table of Contents

Advertisement

This completes the initial configuration of the PC Blade Switch from the CLI. The configured parameters
enable further configuration from any remote location.

Advanced Configuration

This section provides information about security management based on the Authentication,
Authorization, and Accounting (AAA) mechanism, and includes the following topics:
Console
Telnet
SSH
HTTP
HTTPS

Security Management and Password Configuration

System security is handled through the AAA (Authentication, Authorization, and Accounting) mechanism
that manages user access rights, privileges, and management methods. AAA uses both local and
remote user databases. Data encryption is handled through the SSH mechanism.
The system is delivered with no default password configured; all passwords are user-defined. If a user-
defined password is lost, you can invoke a password recovery procedure from the Startup menu. The
procedure is applicable for the local terminal only and allows a one-time access to the device from the
local terminal with no password entered.

Configuring Security Passwords Introduction

You can configure the security passwords can be configured for the following services:
Console
Telnet
SSH
HTTP
HTTPS
NOTE:
Passwords are user-defined.
When creating a user name, privilege levels are "1" and "15" with the default priority being "1", which
allows access but not configuration rights. A priority of "15" must be set to enable access and
configuration rights. Although user names can be assigned a privilege level of "15" without a password,
this is not recommended. If there is no specified password, privileged users can access the Web
interface with any password.
20
Chapter 2 First Time Installation
ENWW

Advertisement

Table of Contents
loading

Table of Contents