Network Router User Manual
212777-A, February 2002
99
CHAPTER 5
Secure Switch Management
This chapter discusses the use of secure tunnels so that the data on the network is encrypted
and secured for messages between a remote administrator and the switch.
To limit access to the switch’s Management Processor without having to configure filters for
each switch port, you can set a source IP address (or range) that will be allowed to connect to
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface
(BBI). This will also help prevent spoofing or attacks on the switch’s TCP/IP stack. The fol-
lowing sections are addressed in this chapter:
n “Setting Allowable Source IP Address Ranges” on page 100
n “Secure Switch Management” on page 101
n “RADIUS Authentication and Authorization” on page 103
n “Secure Shell and Secure Copy” on page 107
n “Port Mirroring” on page 113