HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 4

Controlling SSH logins, Using the device as an FTP server, FTP server configuration example, ii

Page 4 highlights

Configuring SNMPv1 or SNMPv2c access 35 Controlling user access 36 FIPS compliance 36 Controlling Telnet/SSH logins 36 Controlling Telnet logins (not supported in FIPS mode 36 Controlling SSH logins 36 Configuration example 37 Controlling SNMP access 37 Configuration procedure 37 Configuration example 38 Configuring command authorization 39 Configuration procedure 39 Configuring command accounting 40 Configuration procedure 40 Configuring RBAC 42 Overview 42 Permission assignment 42 Assigning user roles 44 FIPS compliance 45 Configuration task list 45 Creating user roles 45 Configuring user role rules 46 Configuring feature groups 46 Changing resource access policies 47 Changing the interface policy of a user role 47 Changing the VLAN policy of a user role 48 Changing the VPN instance policy of a user role 48 Assigning user roles 48 Enabling the default user role function 48 Assigning user roles to remote AAA authentication users 49 Assigning user roles to local AAA authentication users 49 Assigning user roles to non-AAA authentication users on user interfaces 50 Configuring temporary user role authorization 50 Configuration guidelines 51 Configuring user role authentication 52 Obtaining temporary user role authorization 52 Displaying RBAC settings 52 RBAC configuration examples 53 RBAC configuration example for local AAA authentication users 53 RBAC configuration example for RADIUS authentication users 54 RBAC configuration example for HWTACACS authentication users 57 Troubleshooting RBAC 61 Local users have more access permissions than intended 61 Login attempts by RADIUS users always fail 61 Configuring FTP 63 FIPS compliance 63 Using the device as an FTP server 63 Configuring basic parameters 64 Configuring authentication and authorization 64 Manually releasing FTP connections 64 Displaying and maintaining the FTP server 65 FTP server configuration example 65 Using the device as an FTP client 66 ii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

ii
Configuring SNMPv1 or SNMPv2c access················································································································· 35
Controlling user access ·············································································································································· 36
FIPS compliance ····························································································································································· 36
Controlling Telnet/SSH logins ······································································································································ 36
Controlling Telnet logins (not supported in FIPS mode)····················································································· 36
Controlling SSH logins
·········································································································································· 36
Configuration example ········································································································································· 37
Controlling SNMP access·············································································································································· 37
Configuration procedure ······································································································································ 37
Configuration example ········································································································································· 38
Configuring command authorization ··························································································································· 39
Configuration procedure ······································································································································ 39
Configuring command accounting ······························································································································· 40
Configuration procedure ······································································································································ 40
Configuring RBAC······················································································································································ 42
Overview········································································································································································· 42
Permission assignment ·········································································································································· 42
Assigning user roles ·············································································································································· 44
FIPS compliance ····························································································································································· 45
Configuration task list ···················································································································································· 45
Creating user roles ························································································································································· 45
Configuring user role rules ············································································································································ 46
Configuring feature groups ··········································································································································· 46
Changing resource access policies ······························································································································ 47
Changing the interface policy of a user role······································································································ 47
Changing the VLAN policy of a user role ·········································································································· 48
Changing the VPN instance policy of a user role ····························································································· 48
Assigning user roles ······················································································································································· 48
Enabling the default user role function················································································································ 48
Assigning user roles to remote AAA authentication users ················································································ 49
Assigning user roles to local AAA authentication users ···················································································· 49
Assigning user roles to non-AAA authentication users on user interfaces ······················································· 50
Configuring temporary user role authorization ·········································································································· 50
Configuration guidelines ······································································································································ 51
Configuring user role authentication ··················································································································· 52
Obtaining temporary user role authorization ···································································································· 52
Displaying RBAC settings ·············································································································································· 52
RBAC configuration examples ······································································································································ 53
RBAC configuration example for local AAA authentication users ··································································· 53
RBAC configuration example for RADIUS authentication users ······································································· 54
RBAC configuration example for HWTACACS authentication users ······························································ 57
Troubleshooting RBAC ··················································································································································· 61
Local users have more access permissions than intended ················································································ 61
Login attempts by RADIUS users always fail ······································································································ 61
Configuring FTP ·························································································································································· 63
FIPS compliance ····························································································································································· 63
Using the device as an FTP server
································································································································ 63
Configuring basic parameters ····························································································································· 64
Configuring authentication and authorization ··································································································· 64
Manually releasing FTP connections ··················································································································· 64
Displaying and maintaining the FTP server ········································································································ 65
FTP server configuration example
························································································································ 65
Using the device as an FTP client ································································································································· 66