212777-A, February 2002 99

CHAPTER 5

Secure Switch Management
This chapter discusses the use of secure tunnels so that the data on the network is encrypted
and secured for messages between a remote administrator and the switch.
To limit access to the switchs Management Processor without having to configure filters for
each switch port, you can set a source IP address (or range) that will be allowed to connect to
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface
(BBI). This will also help prevent spoofing or attacks on the switchs TCP/IP stack. The fol-
lowing sections are addressed in this chapter:
nSetting Allowable Source IP Address Ranges on page 100
nSecure Switch Management on page 101
nRADIUS Authentication and Authorization on page 103
nSecure Shell and Secure Copy on page 107
nPort Mirroring on page 113