Network Router User Manual

212777-A, February 2002
99
CHAPTER 5
Secure Switch Management
This chapter discusses the use of secure tunnels so that the data on the network is encrypted
and secured for messages between a remote administrator and the switch.
To limit access to the switchs Management Processor without having to configure filters for
each switch port, you can set a source IP address (or range) that will be allowed to connect to
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface
(BBI). This will also help prevent spoofing or attacks on the switchs TCP/IP stack. The fol-
lowing sections are addressed in this chapter:
n Setting Allowable Source IP Address Ranges on page 100
n Secure Switch Management on page 101
n RADIUS Authentication and Authorization on page 103
n Secure Shell and Secure Copy on page 107
n Port Mirroring on page 113