Enforcing Switch Security
Network Access Security
keys.) KMS provides specific instances of routing protocols with one or more Send or Accept keys that must be active at the time of a request.
Refer to the chapter titled “Key Management System” in the Access Security Guide for your switch model.
While not specifically a tool for controlling network access, this feature does help to protect the network from attack and is recommeded for use on the network edge. It is primarily focused on the class of
Refer to the chapter titled “Virus Throttling” in the Access Security Guide for your switch model.
IDM is a
Using IDM, a system administrator can configure automatic and dynamic security to operate at the network edge when a user connects to the network. This operation enables the network to distinguish among different users and what each is authorized to do. Guest access can also be configured without compromising internal security. This means that users can be identified and either approved or denied at the edge of the network instead of in the core.
Criteria for enforcing
■authorized user identity
■authorized device identity (MAC address)
■software running on the device
■physical location in the network
■time of day
Responses can be configured to support the networking requirements, user (SNMP) community, service needs, and access security level for a given client and device.
For more information on IDM, visit the ProCurve web site at http://www.procurve.com and click on Products and Solutions, then Identity Driven Management (under Network Management).
19