Dell FCX624-I Laptop User Manual


  Open as PDF
of 1494
 
PowerConnect B-Series FCX Configuration Guide 1137
53-1002266-01
Restricting remote access to management functions
32
Restricting remote access to management functions
You can restrict access to management functions from remote sources, including Telnet, the Web
Management Interface, and SNMP. The following methods for restricting remote access are
supported:
Web management access SNMP read or
read-write
community strings
Regulate Web management access using ACLs page 1139
Allow Web management access only from
specific IP addresses
page 1141
Allow Web management access only to clients
connected to a specific VLAN
page 1145
Disable Web management access page 1148
Configure SSL security for the Web
Management Interface
page 1161
Set up local user accounts page 1154
Establish SNMP read or read-write community
strings for SNMP versions 1 and 2
page 1365
Establishing user groups for SNMP version 3 page 1370
Configure TACACS/TACACS+ security page 1163
Configure RADIUS security page 1181
SNMP (Brocade Network
Advisor) access
SNMP read or
read-write
community strings
and the password
to the Super User
privilege level
NOTE: SNMP read
or
read-write
community
strings are
always
required
for SNMP
access to
the device.
Regulate SNMP access using ACLs page 1140
Allow SNMP access only from specific IP
addresses
page 1142
Disable SNMP access page 1149
Allow SNMP access only to clients connected to
a specific VLAN
page 1145
Establish passwords to management levels of
the CLI
page 1150
Set up local user accounts page 1154
Establish SNMP read or read-write community
strings
page 1163
TFTP access Not secured Allow TFTP access only to clients connected to a
specific VLAN
page 1145
Disable TFTP access page 1149
Access for Stacked
Devices
Access to multiple
consoles must be
secured after AAA
is enabled
Extra steps must be taken to secure multiple
consoles in an IronStack.
page 1165
TABLE 200 Ways to secure management access to Dell PowerConnect devices (Continued)
Access method How the access
method is secured
by default
Ways to secure the access method See page