HP (Hewlett-Packard) 445946-001 Switch User Manual


 
Contents
3
Contents
Accessing the switch
Introduction........................................................................................................................................... 9
Additional references ........................................................................................................................... 10
Typographical conventions.................................................................................................................... 10
Management Network.......................................................................................................................... 10
Connecting through the console port.................................................................................................. 11
Connecting through Telnet................................................................................................................ 11
Connecting through Secure Shell....................................................................................................... 11
Using the command line interfaces ......................................................................................................... 12
Configuring an IP interface............................................................................................................... 12
Using the Browser-based Interface.......................................................................................................... 13
Using Simple Network Management Protocol .......................................................................................... 14
SNMP v1.0.................................................................................................................................... 14
SNMP v3.0.................................................................................................................................... 14
Default configuration ....................................................................................................................... 14
User configuration........................................................................................................................... 15
View based configurations ............................................................................................................... 16
CLI user equivalent..................................................................................................................... 16
CLI oper equivalent .................................................................................................................... 17
Configuring SNMP trap hosts ........................................................................................................... 17
SNMPv1 trap host...................................................................................................................... 17
SNMPv2 trap host configuration ....................................................................................................... 19
SNMPv3 trap host configuration ....................................................................................................... 19
Secure access to the switch ................................................................................................................... 20
Setting allowable source IP address ranges ........................................................................................ 20
Configuring an IP address range for the management network ........................................................ 21
RADIUS authentication and authorization........................................................................................... 21
How RADIUS authentication works............................................................................................... 21
Configuring RADIUS on the switch (CLI example) ........................................................................... 22
Configuring RADIUS on the switch (BBI example) ........................................................................... 23
RADIUS authentication features.................................................................................................... 24
User accounts for RADIUS users ................................................................................................... 24
RADIUS attributes for user privileges............................................................................................. 25
TACACS+ authentication ...................................................................................................................... 25
How TACACS+ authentication works................................................................................................. 26
TACACS+ authentication features ..................................................................................................... 26
Authorization.................................................................................................................................. 26
Accounting..................................................................................................................................... 27
Configuring TACACS+ authentication on the switch (CLI example) ....................................................... 28
Configuring TACACS+ authentication on the switch (BBI example) ....................................................... 29
Secure Shell and Secure Copy............................................................................................................... 30
Configuring SSH and SCP features (CLI example)........................................................................... 31
Using SSH and SCP client commands........................................................................................... 32
SSH and SCP encryption of management messages ....................................................................... 33
Generating RSA host and server keys for SSH access ..................................................................... 33
SSH/SCP integration with RADIUS and TACACS+ authentication..................................................... 34