Windows NT®, Windows®, and MS Windows® are US
registered trademarks of Microsoft Corporation.
Software Credits
SSH on ProCurve Switches is based on the OpenSSH
software toolkit. This product includes software developed
by the OpenSSH Project for use in the OpenSSH Toolkit. For
more information on OpenSSH, visit http://
www.openssh.com.
SSL on ProCurve Switches is based on the OpenSSL software
toolkit. This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit. For more
information on OpenSSL, visit
http://www.openssl.org.
This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com)
This product includes software written by Tim Hudson
(tjh@cryptsoft.com)
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY
OF ANY KIND WITH REGARD TO THIS MATERIAL,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing,
performance, or use of this material.
Hewlett-Packard Company shall not be liable for technical
or editorial errors or omissions contained herein. The
information is provided "as is" without warranty of any kind
and is subject to change without notice. The warranties for
Hewlett-Packard Company products are set forth in the
express limited warranty statements for such products.
Nothing herein should be construed as constituting an
additional warranty.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished
by Hewlett-Packard.
Warranty
See the Customer Support/Warranty booklet included with
the product.
A copy of the specific warranty terms applicable to your
Hewlett-Packard products and replacement parts can be
obtained from your HP Sales and Service Office or
authorized dealer.
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
http://www.procurve.com
■Read Me First - a printed guide shipped with your switch. Provides
software update information, product notes, and other information.
■Installation and Getting Started Guide - a printed guide shipped
with your switch. This guide explains how to prepare for and perform
the physical installation and connection to your network.
■Management and Configuration Guide - included as a PDF file on
the Documentation CD. This guide describes how to configure,
manage, and monitor basic switch operation.
■Advanced Traffic Management Guide - included as a PDF file on
the Documentation CD. This guide explains the configuration and
operation of traffic management features such as spanning tree,
VLANs, and IP routing.
■Access Security Guide - included as a PDF file on the
Documentation CD. This guide explains the configuration and
operation of access security and user authentication features on the
switch.
■Release Notes - posted on the ProCurve web site to provide
information on software updates. The release notes describe new
features, fixes, and enhancements that become available between
revisions of the above guides.
NoteFor the latest version of all ProCurve switch documentation, including release
notes covering recently added features, visit the ProCurve Networking
website at http://www.procurve.com. Click on Technical support, and then
click on Product manuals.
xi
Product Documentation
Feature Index
For the manual set supporting your switch model, the following feature index
indicates which manual to consult for information on a given software feature.
(Note that some software features are not supported on all switch models.)
To Set Up and Install the Switch in Your Network . . . . . . . . . . . . . . . . 1-9
1-1
Getting Started
Introduction
Introduction
This Access Security Guide describes how to use ProCurve’s switch security
features to protect access to your switch. This guide is intended to support
the following switches:
■ProCurve Series 2600
■ProCurve Series 2600-PWR
■ProCurve Series 2800
■ProCurve Series 4100gl
■ProCurve Switch 6108
For an overview of other product documentation for the above switches, refer
to “Product Documentation” on page xi.
The Product Documentation CD-ROM shipped with the switch includes a
copy of this guide. You can also download a copy from the ProCurve website,
http://www.procurve.com.
1-2
Overview of Access Security Features
The access security features covered in this guide include:
■Local Manager and Operator Passwords (page 2-1): Control
access and privileges for the CLI, menu, and web browser interfaces.
■TACACS+ Authentication (page 4-1): Uses an authentication appli-
cation on a server to allow or deny access to a switch.
■RADIUS Authentication and Accounting (page 5-1): Like
TACACS+, uses an authentication application on a central server to
allow or deny access to the switch. RADIUS also provides accounting
services for sending data about user activity and system events to a
RADIUS server.
encrypted paths for remote access to switch management functions.
Overview of Access Security Features
■Secure Socket Layer (SSL) (page 7-1): Provides remote web access
Getting Started
to the switch via encrypted authentication paths between the switch
and management station clients capable of SSL/TLS operation.
■Port-Based Access Control (802.1X) (page 8-1): On point-to-point
connections, enables the switch to allow or deny traffic between a
port and an 802.1X-aware device (supplicant) attempting to access
the switch. Also enables the switch to operate as a supplicant for
connections to other 802.1X-aware switches.
■Port Security (page 9-1): Enables a switch port to maintain a unique
list of MAC addresses defining which specific devices are allowed to
access the network through that port. Also enables a port to detect,
prevent, and log access attempts by unauthorized devices.
in-band security by enabling outbound destination ports on the switch
to forward or drop traffic from designated source ports (within the
same VLAN).
■Authorized IP Managers (page 11-1): Allows access to the switch
by a networked device having an IP address previously configured in
the switch as "authorized".
Management Access Security Protection
In considering management access security for your switch, there are two key
areas to protect:
■Unauthorized client access to switch management features
■Unauthorized client access to the network.
Table 1-1 on page 1-4 provides an overview of the type of protection offered
by each switch security feature.
NoteProCurve recommends that you use local passwords together with your
switch’s other security features to provide a more comprehensive security
fabric than if you use only local passwords.
1-3
Getting Started
Overview of Access Security Features
Table 1-1.Management Access Security Protection
Security FeatureOffers Protection Against Unauthorized Client Access to
Switch Management Features
ConnectionTelnetSNMP
Local Manager and Operator
Usernames and Passwords
TACACS+
RADIUS
SSH
SSL
Port-Based Access Control (802.1X)PtP:Ye sYesYesYesYes
Port Security (MAC address)
Authorized IP Managers
1
The local Manager/Operator, TACACS+, and RADIUS options (direct connect or modem access) also offer protection
1
1
for serial port access.
1
PtP:Ye sNoYesYesNo
Remote:Ye sNoYesYesNo
PtP:Ye sNoNo YesNo
Remote:Ye sNoNoYesNo
PtP:Ye sNoNoYesNo
Remote:Ye sNoNoYesNo
Ptp:Ye sNoNoYesNo
Remote:Ye sNoNoYesNo
Ptp:NoNoYesNoNo
Remote:NoNoYesNoNo
Remote:NoNoNoNoNo
PtP:Ye sYesYesYesYes
Remote:Ye sYesYesYesYes
PtP:Ye sYesYesYesNo
Remote:Ye sYesYesYesNo
(Net Mgmt)
Web
Browser
SSH
Client
Offers Protection
Against
Unauthorized Client
Access to the
Network
1-4
General Switch Traffic Security Guidelines
Where the switch is running multiple security options, it implements network
traffic security based on the OSI (Open Systems Interconnection model)
precedence of the individual options, from the lowest to the highest. The
following list shows the order in which the switch implements configured
security features on traffic moving through a given port.
1.Disabled/Enabled physical port
2.MAC lockout (applies to all ports on the switch)
3.MAC lockdown
4.Port security
5.Authorized IP Managers
6.Application features at higher levels in the OSI model, such as SSH
(The above list does not address the mutually exclusive relationship that
exists among some security features.)
Getting Started
Conventions
Conventions
This guide uses the following conventions for command syntax and displayed
information.
Feature Descriptions by Model
In cases where a software feature is not available in all of the switch models
covered by this guide, the section heading specifically indicates which product
or product series offer the feature.
For example (the switch model is highlighted here in bold italics):
“Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches”.
To simplify recognition, this guide uses ProCurve to represent command
prompts for all models. For example:
ProCurve#
(You can use the hostname command to change the text in the CLI prompt.)
Screen Simulations
Figures containing simulated screen text and command output look like this:
1-6
Figure 1-1. Example of a Figure Showing a Simulated Screen
In some cases, brief command-output sequences appear outside of a
numbered figure. For example:
ProCurve(config)# ip default-gateway 18.28.152.1/24
ProCurve(config)# vlan 1 ip address 18.28.36.152/24
ProCurve(config)# vlan 1 ip igmp
Port Identity Examples
This guide describes software applicable to both chassis-based and stackable
ProCurve switches. Where port identities are needed in an example, this guide
uses the chassis-based port identity system, such as “A1”, “B3 - B5”, “C7”, etc.
However, unless otherwise noted, such examples apply equally to the
stackable switches, which for port identities typically use only numbers, such
as “1”, “3-5”, “15”, etc.
Sources for More Information
Getting Started
Sources for More Information
For additional information about switch operation and features not covered
in this guide, consult the following sources:
■For information on which product manual to consult on a given
software feature, refer to “Product Documentation” on page xi.
NoteFor the latest version of all ProCurve switch documentation, including
release notes covering recently added features, visit the ProCurve
Networking website at http://www.procurve.com. Click on Technical support, and then click on Product manuals.
■For information on specific parameters in the menu interface, refer
to the online help provided in the interface. For example:
Online Help for
Menu interface
Figure 1-2. Getting Help in the Menu Interface
■For information on a specific command in the CLI, type the command
name followed by “help”. For example:
1-7
Getting Started
Need Only a Quick Start?
Figure 1-3. Getting Help in the CLI
■For information on specific features in the Web browser interface,
use the online help. For more information, refer to the Management
and Configuration Guide for your switch.
■For further information on ProCurve Networking switch technology,
visit the ProCurve website at:
http://www.procurve.com
1-8
Need Only a Quick Start?
IP Addressing
If you just want to give the switch an IP address so that it can communicate
on your network, or if you are not using multiple VLANs, ProCurve
recommends that you use the Switch Setup screen to quickly configure IP
addressing. To do so, do one of the following:
■Enter setup at the CLI Manager level prompt.
ProCurve# setup
■In the Main Menu of the Menu interface, select
8. Run Setup
For more on using the Switch Setup screen, see the Installation and Getting
Started Guide you received with the switch.
Need Only a Quick Start?
Getting Started
To Set Up and Install the Switch in Your Network
Important!Use the Installation and Getting Started Guide shipped with your switch for
the following:
■Notes, cautions, and warnings related to installing and using the
switch and its related modules
■Instructions for physically installing the switch in your network
■Quickly assigning an IP address and subnet mask, setting a Manager
password, and (optionally) configuring other basic features.
■Interpreting LED behavior.
For the latest version of the Installation and Getting Started Guide and other
documentation for your switch, visit the ProCurve website. (Refer to “Product
Documentation” on page xi of this guide for further details.)
The following features apply only to the Series 2600, 2600-PWR, and 2800 Switches.
Show front-panel-securityn/a—page 1-13—
Front-panel-security—page 1-13—
password-clearenabled—page 1-13—
reset-on-cleardisabled—page 1-14—
factory-resetenabled—page 1-15—
password-recoveryenabled—page 1-15—
Console access includes both the menu interface and the CLI. There are two
levels of console access: Manager and Operator. For security, you can set a
password pair (username and password) on each of these levels.
NoteUsernames are optional. Also, in the menu interface, you can configure
passwords, but not usernames. To configure usernames, use the CLI or the
web browser interface.
Level Actions Permitted
Manager:Access to all console interface areas.
This is the default level. That is, if a Manager password has not been set prior
to starting the current console session, then anyone having access to the
console can access any area of the console interface.
Operator:Access to the Status and Counters menu, the Event Log, and the CLI*, but no
Configuration capabilities.
On the Operator level, the configuration menus, Download OS, and Reboot
Switch options in the Main Menu are not available.
*Allows use of the ping, link-test, show, menu, exit, and logout commands, plus the enable
command if you can provide the Manager password.
2-2
Configuring Username and Password Security
Overview
To configure password security:
1.Set a Manager password pair (and an Operator password pair, if applicable
for your system).
2.Exit from the current console session. A Manager password pair will now
be needed for full access to the console.
If you do steps 1 and 2, above, then the next time a console session is started
for either the menu interface or the CLI, a prompt appears for a password.
Assuming you have protected both the Manager and Operator levels, the level
of access to the console interface will be determined by which password is
entered in response to the prompt.
If you set a Manager password, you may also want to configure the
Inactivity Time parameter. (Refer to the Management and Configuration
Guide for your switch.) This causes the console session to end after the
specified period of inactivity, thus giving you added security against unauthorized console access.
NoteThe manager and operator passwords and (optional) usernames control
access to the menu interface, CLI, and web browser interface.
If you configure only a Manager password (with no Operator password), and
in a later session the Manager password is not entered correctly in response
to a prompt from the switch, then the switch does not allow management
access for that session.
Passwords are case-sensitive.
CautionIf the switch has neither a Manager nor an Operator password, anyone
having access to the switch through either Telnet, the serial port, or the web
browser interface can access the switch with full manager privileges. Also,
if you configure only an Operator password, entering the Operator password enables full manager privileges.
The rest of this section covers how to:
■Set passwords
■Delete passwords
■Recover from a lost password
2-3
Configuring Username and Password Security
Configuring Local Password Security
Configuring Local Password Security
Menu: Setting Passwords
As noted earlier in this section, usernames are optional. Configuring a username requires either the CLI or the web browser interface.
1.From the Main Menu select:
3. Console Passwords
2-4
Figure 2-1. The Set Password Screen
2.To set a new password:
a.Select Set Manager Password or Set Operator Password. You will then
be prompted with Enter new password.
b.Type a password of up to 16 ASCII characters with no spaces and
press
[Enter]. (Remember that passwords are case-sensitive.)
c.When prompted with Enter new password again, retype the new pass-
word and press
After you configure a password, if you subsequently start a new console
session, you will be prompted to enter the password. (If you use the CLI or
web browser interface to configure an optional username, the switch will
prompt you for the username, and then the password.)
To Delete Password Protection (Including Recovery from a Lost
Password): This procedure deletes all usernames (if configured) and pass-
words (Manager and Operator).
[Enter].
Loading...
+ 276 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.