Windows NT®, Windows®, and MS Windows® are US
registered trademarks of Microsoft Corporation.
Software Credits
SSH on ProCurve Switches is based on the OpenSSH
software toolkit. This product includes software developed
by the OpenSSH Project for use in the OpenSSH Toolkit. For
more information on OpenSSH, visit www.openssh.com.
SSL on ProCurve Switches is based on the Op enSSL software
toolkit. This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit. For more
information on OpenSSL, visit
www.openssl.org.
This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com)
This product includes software written by Tim Hudson
(tjh@cryptsoft.com)
or editorial errors or omissions contained herein. The
information is provided "as is" without warranty of any kind
and is subject to change without notice. The warranties for
Hewlett-Packard Company products are set forth in the
express limited warranty statements for such products.
Nothing herein should be construed as constituting an
additional warranty.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished
by Hewlett-Packard.
Warran ty
See the Customer Support/Warranty booklet included with
the product.
A copy of the specific warranty terms applicable to your
Hewlett-Packard products and replacement parts can be
obtained from your HP Sales and Service Office or
authorized dealer.
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY
OF ANY KIND WITH REGARD TO THIS MATERIAL,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing,
performance, or use of this material.
Hewlett-Packard Company shall not be liable for technical
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
http://www.procurve.com
■Read Me First - a printed guide shipped with your switch. Provides
software update information, product notes, and other information.
■Installation and Getting Started Guide - a printed guide shipped
with your switch. This guide explains how to prepare for and perform
the physical installation and connection to your network.
■Management and Configuration Guide - a PDF file on the
ProCurve Networking Web Site. This guide describes how to
configure, manage, and monitor basic switch operation.
■Advanced Traffic Management Guide - a PDF file on the ProCurve
Networking Web Site. This guide explains the configuration and
operation of traffic management features such as spanning tree and
VLANs.
■Access Security Guide - a PDF file on the ProCurve Networking
Web Site. This guide explains the configuration and operation of
access security and user authentication features on the switch.
■Release Notes - posted on the ProCurve web site to provide
information on software updates. The release notes describe new
features, fixes, and enhancements that become available between
revisions of the above guides.
NoteFor the latest version of all ProCurve switch documentation, including release
notes covering recently added features, visit the ProCurve Networking
website at www.procurve.com. Click on Technical support, and then click on Product manuals (all).
xi
Product Documentation
Feature Index
For the manual set supporting your switch model, the following feature index
indicates which manual to consult for information on a given software feature.
To Set Up and Install the Switch in Your Network . . . . . . . . . . . . . . . . 1-9
1-1
Getting Started
Introduction
Introduction
This Access Security Guide describes how to use ProCurve’s switch security
features to protect access to your switch. This guide is intended to support
the following switches:
■ProCurve Switch 2510-24
■ProCurve Switch 2510-48
For an overview of other product documentation for the above switches, refer
to “Product Documentation” on page xi.
You can download a copy from the ProCurve Networking website,
www.procurve.com.
Overview of Access Security Features
1-2
The access security features covered in this guide include:
■Local Manager and Operator Passwords (page 2-1): Control
access and privileges for the CLI, menu, and web browser interfaces.
■TACACS+ Authentication (page 4-1): Uses an authentication appli-
cation on a server to allow or deny access to a switch.
■RADIUS Authentication and Accounting (page 5-1): Like
TACACS+, uses an authentication application on a central server to
allow or deny access to the switch. RADIUS also provides accounting
services for sending data about user activity and system events to a
RADIUS server.
encrypted paths for remote access to switch management functions.
■Secure Socket Layer (SSL) (page 7-1): Provides remote web access
to the switch via encrypted authentication paths between the switch
and management station clients capable of SSL/TLS operation.
Overview of Access Security Features
■Port-Based Access Control (802.1X) (page 8-1): On point-to-point
Getting Started
connections, enables the switch to allow or deny traffic between a
port and an 802.1X-aware device (supplicant) attempting to access
the switch. Also enables the switch to operate as a supplicant for
connections to other 802.1X-aware switches.
■Port Security (page 9-1): Enables a switch port to maintain a unique
list of MAC addresses defining which specific devices are allowed to
access the network through that port. Also enables a port to detect,
prevent, and log access attempts by unauthorized devices.
■Authorized IP Managers (page 10-1): Allows access to the switch
by a networked device having an IP address previously configured in
the switch as “authorized”.
Management Access Security Protection
In considering management access security for your switch, there are two key
areas to protect:
■Unauthorized client access to switch management features
■Unauthorized client access to the network.
Table 1-1 on page 1-4 provides an overview of the type of protection offered
by each switch security feature.
NoteProCurve recommends that you use local passwords together with your
switch’s other security features to provide a more comprehensive security
fabric than if you use only local passwords.
1-3
Getting Started
Overview of Access Security Features
Table 1-1.Management Access Security Protection
Security FeatureOffers Protection Against Unauthorized Client Access to
ConnectionTel ne tSNMP
Local Manager and Operator
Usernames and Passwords
TA CA C S+PtP:Ye sNoNo YesNo
RADIUS
SSHPtp:Ye sNoNoYe sNo
SSLPtp:NoNoYe sNoNo
Port-Based Access Control (802.1X)
Port Security (MAC address)PtP:YesYesYesYesYes
Authorized IP ManagersPtP:YesYesYesYesNo
1
Remote:Ye sNoYe sYe sNo
Remote:Ye sNoNoYesNo
Remote:Ye sNoNoYesNo
Remote:Ye sNoNoYesNo
Remote:NoNoYe sNoNo
Remote:NoNoNoNoNo
Remote:YesYesYesYesYes
Remote:YesYesYesYesNo
Switch Management Features
Web
(Net Mgmt)
PtP:Ye sNoYe sYe sNo
PtP:Ye sNoNoYesNo
PtP:YesYesYesYesYes
Browser
SSH
Client
Offers Protection
Against
Unauthorized Client
Access to the
Network
General Switch Traffic Security Guidelines
1-4
Where the switch is running multiple security options, it implements network
traffic security based on the OSI (Open Systems Interconnection model)
precedence of the individual options, from the lowest to the highest. The
following list shows the order in which the switch implements configured
security features on traffic moving through a given port.
1.Disabled/Enabled physical port
2.Port security
3.Authorized IP Managers
4.Application features at higher levels in the OSI model, such as SSH
(The above list does not address the mutually exclusive relationship that
exists among some security features.)
Getting Started
Conventions
Conventions
This guide uses the following conventions for command syntax and displayed
information.
In the default configuration, your switch displays the following CLI prompt:
ProCurve Switch 2510-24#
To simplify recognition, this guide uses ProCurve to represent command
prompts for all models. For example:
ProCurve#
(You can use the hostname command to change the text in the CLI prompt.)
Screen Simulations
Figures containing simulated screen text and command output look similar
to this:
ProCurve(config)# show version
Image stamp: /sw/code/build/dosx(ndx)
Dec 11 2007 11:44:02
U.11.03
1340
Boot Image: Primary
1-6
Figure 1-1. Example of a Figure Showing a Simulated Screen
In some cases, brief command-output sequences appear outside of a
numbered figure. For example:
ProCurve(config)# ip default-gateway 18.28.152.1/24
ProCurve(config)# vlan 1 ip address 18.28.36.152/24
ProCurve(config)# vlan 1 ip igmp
Port Identity Examples
This guide describes software applicable to both chassis-based and stackable
ProCurve switches. Where port identities are needed in an example, this guide
uses the chassis-based port identity system, such as “A1”, “B3 - B5”, “C7”, etc.
However, unless otherwise noted, such examples apply equally to the
stackable switches, which for port identities typically use only numbers, such
as “1”, “3-5”, “15”, etc.
Sources for More Information
Getting Started
Sources for More Information
For additional information about switch operation and features not covered
in this guide, consult the following sources:
■For information on which product manual to consult on a given
software feature, refer to “Product Documentation” on page xi.
NoteFor the latest version of all ProCurve switch documentation, including
release notes covering recently added features, visit the ProCurve
Networking Web Site at www.procurve.com. Click on Technical support, and
then click on Product manuals (all).
■For information on specific parameters in the Menu interface, refer
to the online help provided in the interface. For example:
Figure 1-2. Getting Help in the Menu Interface
Online Help for
Menu interface
1-7
Getting Started
Need Only a Quick Start?
■For information on a specific command in the CLI, type the command
name followed by “help”. For example:
Figure 1-3. Getting Help in the CLI
■For information on specific features in the Web browser interface,
use the online help. For more information, refer to the Management
and Configuration Guide for your switch.
■For further information on ProCurve Networking switch technology,
visit the ProCurve Networking Website at:
www.procurve.com
1-8
Need Only a Quick Start?
IP Addressing
If you just want to give the switch an IP address so that it can communicate
on your network, or if you are not using multiple VLANs, ProCurve
recommends that you use the Switch Setup screen to quickly configure IP
addressing. To do so, do one of the following:
■Enter setup at the CLI Manager level prompt.
ProCurve# setup
■Or, run the Menu interface and select 8. Run Setup from the Main Menu.
For more on using the Switch Setup screen, see the Installation and Getting
Started Guide you received with the switch.
Need Only a Quick Start?
Getting Started
To Set Up and Install the Switch in Your Network
Important!Use the Installation and Getting Started Guide shipped with your switch for
the following:
■Notes, cautions, and warnings related to installing and using the
switch
■Instructions for physically installing the switch in your network
■Quickly assigning an IP address and subnet mask, setting a Manager
password, and (optionally) configuring other basic features.
■Interpreting LED behavior.
For the latest version of the Installation and Getting Started Guide and other
documentation for your switch, visit the ProCurve Networking Web site.
(Refer to “Product Documentation” on page xi of this guide for further
details.)
Console access includes both the menu interface and the CLI. There are two
levels of console access: Manager and Operator. For security, you can set a
password pair (username and password) on each of these levels.
NoteUsernames are optional. Also, in the menu interface, you can configure
passwords, but not usernames. To configure usernames, use the CLI or the
web browser interface.
Level Actions Permitted
Manager:Access to all console interface areas.
This is the default level. That is, if a Manager password has not been set prior
to starting the current console session, then anyone having access to the
console can access any area of the console interface.
Operator:Access to the Status and Counters menu, the Event Log, and the CLI*, but no
*Allows use of the ping, link-test, show, menu, exit, and logout commands, plus the enable
command if you can provide the Manager password.
2-2
Configuration capabilities.
On the Operator level, the configuration menus, Download OS, and Reboot
Switch options in the Main Menu are not available.
Configuring Username and Password Security
Overview
To configure password security:
1.Set a Manager password pair (and an Operator password pair, if applicable for your system).
2.Exit from the current console session. A Manager password pair will now
be needed for full access to the console.
If you do steps 1 and 2, above, then the next time a console session is started
for either the menu interface or the CLI, a prompt appears for a password.
Assuming you have protected both the Manager and Operator levels, the level
of access to the console interface will be determined by which password is
entered in response to the prompt.
If you set a Manager password, you may also want to configure the
Inactivity Time parameter. (Refer to the Management and Configuration
Guide for your switch.) This causes the console session to end after the
specified period of inactivity, thus giving you added security against unauthorized console access.
NoteThe manager and operator passwords and (optional) usernames control
access to the menu interface, CLI, and web browser interface.
If you configure only a Manager password (with no Operator password), and
in a later session the Manager password is not entered correctly in response
to a prompt from the switch, then the switch does not allow management
access for that session.
Passwords are case-sensitive.
CautionIf the switch has neither a Manager nor an Operator password, anyone
having access to the switch through either Telnet, the serial port, or the web
browser interface can access the switch with full manager privileges. Also,
if you configure only an Operator password, entering the Operator password enables full manager privileges.
The rest of this section covers how to:
■Set passwords
■Delete passwords
■Recover from a lost password
2-3
Configuring Username and Password Security
Configuring Local Password Security
Configuring Local Password Security
Menu: Setting Passwords
As noted earlier in this section, usernames are optional. Configuring a username requires either the CLI or the web browser interface.
1.From the Main Menu select:
3. Console Passwords
2-4
Figure 2-1. The Set Password Screen
2.To set a new password:
a.Select Set Manager Password or Set Operator Password. You will then
be prompted with Enter new password.
b.Type a password of up to 16 ASCII characters with no spaces and
press [Enter]. (Remember that passwords are case-sensitive.)
c.When prompted with Enter new password again, retype the new pass-
word and press [Enter].
After you configure a password, if you subsequently start a new console
session, you will be prompted to enter the password. (If you use the CLI or
web browser interface to configure an optional username, the switch will
prompt you for the username, and then the password.)
To Delete Password Protection (Including Recovery from a Lost
Password): This procedure deletes all usernames (if configured) and pass-
words (Manager and Operator).
Loading...
+ 264 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.