HP BladeSystem bc2200 Embedded Web System User Guide for the HP BladeSystem PC - Page 27

Configuring Device Security

Page 27 highlights

4 Configuring Device Security This section provides access to security pages that contain fields for setting security parameters for ports, device management methods, users, and server security. This section contains the following topics: ■ Configuring Authentication Methods ■ Configuring Network Security Configuring Authentication Methods This section provides information for configuring device authentication methods. This section includes the topics: ■ Defining Access Profiles ■ Defining Profile Rules ■ Defining Authentication Profiles ■ Mapping Authentication Methods ■ Defining RADIUS Settings ■ Defining TACACS+ Authentication ■ Configuring Passwords Defining Access Profiles Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles contain management methods for accessing and managing the device. The device management methods include: ■ All ■ Telnet ■ Secure Telnet (SSH) ■ HTTP ■ SNMP ■ HTTPS Management access to different management methods may differ between user groups. For example, User Group 1 can access the switch module only via an HTTPS session, while User Group 2 can access the switch module using both HTTPS and Telnet sessions. The Access Profiles page contains the currently configured access profiles and their activity status. Assigning an access profile to an interface denies access using other interfaces. If an access profile is assigned to any interface, the device can be accessed by all interfaces. Embedded Web System User Guide www.hp.com 4-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

Embedded Web System User Guide
www.hp.com
4-1
4
Configuring Device Security
This section provides access to security pages that contain fields for setting security parameters
for ports, device management methods, users, and server security. This section contains the
following topics:
Configuring Authentication Methods
Configuring Network Security
Configuring Authentication Methods
This section provides information for configuring device authentication methods. This section
includes the topics:
Defining Access Profiles
Defining Profile Rules
Defining Authentication Profiles
Mapping Authentication Methods
Defining RADIUS Settings
Defining TACACS+ Authentication
Configuring Passwords
Defining Access Profiles
Access profiles are profiles and rules for accessing the device. Access to management functions
can be limited to user groups. User groups are defined for interfaces according to IP addresses or
IP subnets. Access profiles contain management methods for accessing and managing the device.
The device management methods include:
All
Telnet
Secure Telnet (SSH)
HTTP
SNMP
HTTPS
Management access to different management methods may differ between user groups. For
example, User Group 1 can access the switch module only via an HTTPS session, while User
Group 2 can access the switch module using both HTTPS and Telnet sessions. The Access
Profiles page contains the currently configured access profiles and their activity status.
Assigning an access profile to an interface denies access using other interfaces. If an access
profile is assigned to any interface, the device can be accessed by all interfaces.