HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 43

Controlling user access, FIPS compliance, Controlling Telnet/SSH logins

Page 43 highlights

Controlling user access Use ACLs to prevent unauthorized access and configure command authorization and accounting to monitor and control user behaviors. For more information about ACLs, see ACL and QoS Configuration Guide. FIPS compliance The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode. Controlling Telnet/SSH logins Use basic ACLs (2000 to 2999) to filter Telnet and SSH logins by source IP address. Use advanced ACLs (3000 to 3999) to filter Telnet and SSH logins by source and/or destination IP address. Use Ethernet frame header ACLs (4000 to 4999) to filter Telnet and SSH logins by source MAC address. If an applied ACL does not exist or has no rules, no user login restriction is applied. If the ACL exists and has rules, only users permitted by the ACL can access the device through Telnet or SSH. Controlling Telnet logins (not supported in FIPS mode) To control Telnet logins: Step 1. Enter system view. 2. Apply an ACL to filter Telnet logins. Command system-view • telnet server acl acl-number • telnet server ipv6 acl { layer2-acl-number | ipv6 ipv6-acl-number } Remarks N/A By default, no ACL is used to filter Telnet logins. Controlling SSH logins Step 1. Enter system view. Command system-view 2. Apply an ACL to filter • ssh server acl acl-number SSH logins. • ssh server ipv6 acl [ ipv6 ] acl-number 36 Remarks N/A By default, no ACL is used to filter SSH logins. For more information about these two commands, see Security Command Reference.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

36
Controlling user access
Use ACLs to prevent unauthorized access and configure command authorization and accounting to
monitor and control user behaviors. For more information about ACLs, see
ACL and QoS Configuration
Guide.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see
Security Configuration Guide
.
Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.
Controlling Telnet/SSH logins
Use basic ACLs (2000 to 2999) to filter Telnet and SSH logins by source IP address. Use advanced ACLs
(3000 to 3999) to filter Telnet and SSH logins by source and/or destination IP address. Use Ethernet
frame header ACLs (4000 to 4999) to filter Telnet and SSH logins by source MAC address.
If an applied ACL does not exist or has no rules, no user login restriction is applied. If the ACL exists and
has rules, only users permitted by the ACL can access the device through Telnet or SSH.
Controlling Telnet logins (not supported in FIPS mode)
To control Telnet logins:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Apply an ACL to filter
Telnet logins.
telnet server acl
acl-number
telnet server ipv6 acl
{
layer2-acl-number
|
ipv6
ipv6-acl-number
}
By default, no ACL is used to filter
Telnet logins.
Controlling SSH logins
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Apply an ACL to filter
SSH logins.
ssh server acl
acl-number
ssh server ipv6 acl
[
ipv6
]
acl-number
By default, no ACL is used to filter
SSH logins.
For more information about these
two commands, see
Security
Command Reference
.