HP BladeSystem bc2800 Embedded Web System User Guide for the HP BladeSystem PC - Page 48

Configuring Network Security

Page 48 highlights

Configuring Device Security Configuring Network Security Network security manages both access control lists and locked ports. This section contains the following topics: ■ Network Security Overview ■ Defining Port Authentication Properties ■ Defining Port Authentication ■ Configuring Traffic Control Network Security Overview This section provides an overview of network security and contains the following topics: ■ Port-Based Authentication ■ Advanced Port-Based Authentication Port-Based Authentication Port-based authentication authenticates users on a per-port basis using an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port-based authentication includes: ■ Authenticators - Specifies the device port which is authenticated before permitting system access. ■ Supplicants - Specifies the host connected to the authenticated port requesting to access the system services. ■ Authentication Server - Specifies the server that performs the authentication on behalf of the authenticator, and indicates whether the supplicant is authorized to access system services. Port-based authentication creates two access states: ■ Controlled Access - Permits communication between the supplicant and the system, if the supplicant is authorized. ■ Uncontrolled Access - Permits uncontrolled communication regardless of the port state. The device currently supports port-based authentication using RADIUS servers. Advanced Port-Based Authentication Advanced port-based authentication enables multiple hosts to be attached to a single port. Advanced port-based authentication requires only one host to be authorized for all hosts to have system access. If the port is unauthorized, all attached hosts are denied access to the network. Advanced port-based authentication also enables user-based authentication. Specific VLANs in the device are always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require authentication, while data traffic requires authentication. VLANs for which authorization is not required can be defined. Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined as authorized. 4-22 www.hp.com Embedded Web System User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

4-22
www.hp.com
Embedded Web System User Guide
Configuring Device Security
Configuring Network Security
Network security manages both access control lists and locked ports. This section contains the
following topics:
Network Security Overview
Defining Port Authentication Properties
Defining Port Authentication
Configuring Traffic Control
Network Security Overview
This section provides an overview of network security and contains the following topics:
Port-Based Authentication
Advanced Port-Based Authentication
Port-Based Authentication
Port-based authentication authenticates users on a per-port basis using an external server. Only
authenticated and approved system users can transmit and receive data. Ports are authenticated
via the RADIUS server using the
Extensible Authentication Protocol
(EAP). Port-based
authentication includes:
Authenticators
— Specifies the device port which is authenticated before permitting system
access.
Supplicants
— Specifies the host connected to the authenticated port requesting to access
the system services.
Authentication Server
— Specifies the server that performs the authentication on behalf of
the authenticator, and indicates whether the supplicant is authorized to access system
services.
Port-based authentication creates two access states:
Controlled Access
— Permits communication between the supplicant and the system, if the
supplicant is authorized.
Uncontrolled Access
— Permits uncontrolled communication regardless of the port state.
The device currently supports port-based authentication using RADIUS servers.
Advanced Port-Based Authentication
Advanced port-based authentication enables multiple hosts to be attached to a single port.
Advanced port-based authentication requires only one host to be authorized for all hosts to have
system access. If the port is unauthorized, all attached hosts are denied access to the network.
Advanced port-based authentication also enables user-based authentication. Specific VLANs in
the device are always available, even if specific ports attached to the VLAN are unauthorized.
For example, Voice over IP does not require authentication, while data traffic requires
authentication. VLANs for which authorization is not required can be defined. Unauthenticated
VLANs are available to users, even if the ports attached to the VLAN are defined as authorized.