HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Gu - Page 17

Secure access to the switch, Setting allowable source IP address ranges - ethernet blade switch configuration

Page 17 highlights

See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem User Guide for a complete list of supported MIBs. Secure access to the switch Secure switch management is needed for environments that perform significant management functions across the Internet. The following are some of the functions for secured management: • Limiting management users to a specific IP address range. See the "Setting allowable source IP address ranges" section in this chapter. • Authentication and authorization of remote administrators. See the "RADIUS authentication and authorization" section or the "TACACS+ authentication" section, both later in this chapter. • Encryption of management information exchanged between the remote administrator and the switch. See the "Secure Shell and Secure Copy" section later in this chapter. Setting allowable source IP address ranges To limit access to the switch without having to configure filters for each switch port, you can set a source IP address (or range) that will be allowed to connect to the switch IP interface through Telnet, SSH, SNMP, or the switch browserbased interface (BBI). When an IP packet reaches the application switch, the source IP address is checked against the range of addresses defined by the management network and management mask. If the source IP address of the host or hosts is within this range, it is allowed to attempt to log in. Any packet addressed to a switch IP interface with a source IP address outside this range is discarded. Configuring an IP address range for the management network Configure the management network IP address and mask from the System Menu in the CLI. For example: >> Main# /cfg/sys/access/mgmt/add Enter Management Network Address: 192.192.192.0 Enter Management Network Mask: 255.255.255.128 Accessing the switch 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Accessing the switch 17
See the
HP GbE2c Ethernet Blade Switch for c-Class BladeSystem User Guide
for a complete list of supported MIBs.
Secure access to the switch
Secure switch management is needed for environments that perform significant management functions across the
Internet. The following are some of the functions for secured management:
Limiting management users to a specific IP address range. See the “Setting allowable source IP address ranges”
section in this chapter.
Authentication and authorization of remote administrators. See the “RADIUS authentication and authorization”
section or the “TACACS+ authentication” section, both later in this chapter.
Encryption of management information exchanged between the remote administrator and the switch. See the
“Secure Shell and Secure Copy” section later in this chapter.
Setting allowable source IP address ranges
To limit access to the switch without having to configure filters for each switch port, you can set a source IP address
(or range) that will be allowed to connect to the switch IP interface through Telnet, SSH, SNMP, or the switch browser-
based interface (BBI).
When an IP packet reaches the application switch, the source IP address is checked against the range of addresses
defined by the management network and management mask. If the source IP address of the host or hosts is within this
range, it is allowed to attempt to log in. Any packet addressed to a switch IP interface with a source IP address
outside this range is discarded.
Configuring an IP address range for the management network
Configure the management network IP address and mask from the System Menu in the CLI. For example:
>> Main# /cfg/sys/access/mgmt/add
Enter Management Network Address: 192.192.192.0
Enter Management Network Mask:
255.255.255.128