HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 29
FIPS compliance, Logging in through the console/AUX port locally
View all HP 6125XLG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 29 highlights
FIPS compliance The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. In FIPS mode, the device does not support Telnet login. Logging in through the console/AUX port locally To configure console/AUX login, complete the following tasks: Task Remarks (Required.) Configuring login authentication: • Disabling authentication for console/AUX login (not supported in FIPS mode) • Configuring password authentication for console/AUX login (not supported in FIPS mode) • Configuring scheme authentication for console/AUX login Configure one authentication mode as required. In FIPS mode, the device supports only the scheme mode. (Optional.) Configuring common console/AUX user interface settings N/A The console/AUX login configuration is effective only for users who log in after the configuration is completed. Disabling authentication for console/AUX login (not supported in FIPS mode) Step Command 1. Enter system view. system-view 2. Enter console/AUX user-interface { aux | console } user interface view. first-number [ last-number ] 3. Disable authentication. authentication-mode none 4. Assign a user role. user-role role-name Remarks N/A N/A The defaults are as follows: • Console user interface-Authentication is disabled. • AUX user interface-Authentication is disabled if the device started up with the default configuration file, and password authentication is enabled if the device started up with empty configuration. For more information about empty configuration and the default configuration file, see "Managing configuration files." By default, a console/AUX login user is assigned the user role network-admin. 22