![](/images/backgrounds/285815/hp-4100gl-users-manual-54993715x1.png)
Getting Started
Overview of Access Security Features
Allows access to the switch by a networked device having an IP address previously configured in the switch as "authorized".
HP recommends that you use local passwords together with the switch’s other security features to provide a more comprehensive security fabric than if you use only the local password option. Table 1 lists these features with the security coverage they provide.
Table 1. | Management Access Security Protection |
|
|
|
| ||
|
|
|
| ||||
| Security Feature | Offers Protection Against Unauthorized Client Access to | Offers Protection | ||||
|
|
| Switch Management Features |
| Against | ||
|
| Connection | Telnet | SNMP | Web | SSH | Unauthorized Client |
|
| Access to the | |||||
|
|
|
| (Net Mgmt) | Browser | Client | |
|
|
|
| Network | |||
|
|
|
|
|
|
| |
|
|
|
|
|
|
| |
Local Manager and Operator | PtP: | Yes | No | Yes | Yes | No | |
Usernames and Passwords* | Remote: | Yes | No | Yes | Yes | No | |
|
| ||||||
|
|
|
|
|
|
| |
TACACS+* | PtP: | Yes | No | No | Yes | No | |
|
| Remote: | Yes | No | No | Yes | No |
|
|
|
|
|
|
| |
RADIUS* | PtP: | Yes | No | No | Yes | No | |
|
| Remote: | Yes | No | No | Yes | No |
|
|
|
|
|
|
|
|
SSH |
| Ptp: | Yes | No | No | Yes | No |
|
| Remote: | Yes | No | No | Yes | No |
|
|
|
|
|
|
|
|
SSL |
| PtP: | No | No | Yes | No | No |
|
|
|
|
|
|
|
|
|
| Remote: | No | No | Yes | No | No |
|
|
|
|
|
|
| |
PtP: | Yes | Yes | Yes | Yes | Yes | ||
|
| Remote: | No | No | No | No | No |
|
|
|
|
|
|
| |
Port Security (MAC address) | PtP: | Yes | Yes | Yes | Yes | Yes | |
|
| Remote: | Yes | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
| |
Authorized IP Managers | PtP: | Yes | Yes | Yes | Yes | No | |
|
| Remote: | Yes | Yes | Yes | Yes | No |
|
|
|
|
|
|
|
|
*Protection for serial port access includes the local Manager/Operator, TACACS+, and RADIUS options (direct connect or modem access).
There are two security areas to protect: access to the switch management features and access to the network through the switch. The above table shows the type of protection each switch security feature offers.
The Product Documentation
xiii