HP 5120 EI Switch Series Configuration Manual page 6

Hide thumbs Also See for 5120 EI Switch Series:
Table of Contents

Advertisement

Setting the port security mode ···································································································································· 145
Configuration prerequisites ································································································································ 145
Configuration procedure ···································································································································· 145
Configuring port security features ······························································································································ 146
Configuring NTK ················································································································································· 146
Configuring intrusion protection ························································································································ 147
Configuring port security traps ·························································································································· 147
Configuring secure MAC addresses ·························································································································· 148
Configuration prerequisites ································································································································ 148
Configuration procedure ···································································································································· 148
Ignoring authorization information from the server ·································································································· 149
Displaying and maintaining port security·················································································································· 149
Port security configuration examples ························································································································· 150
Configuring the autoLearn mode ······················································································································· 150
Configuring the userLoginWithOUI mode ········································································································ 152
Configuring the macAddressElseUserLoginSecure mode················································································ 156
Troubleshooting port security ······································································································································ 159
Cannot set the port security mode ····················································································································· 159
Cannot configure secure MAC addresses ········································································································ 160
Cannot change port security mode when a user is online ············································································· 160
User profile configuration ·········································································································································· 161
User profile overview ··················································································································································· 161
User profile configuration task list ······························································································································ 161
Creating a user profile ················································································································································ 161
Configuration prerequisites ································································································································ 161
Creating a user profile ········································································································································ 161
Configuring a user profile ··········································································································································· 162
Enabling a user profile ················································································································································ 162
Displaying and maintaining user profile ··················································································································· 163
Password control configuration ································································································································· 164
Password control overview ········································································································································· 164
Password control configuration task list ····················································································································· 166
Configuring password control ···································································································································· 167
Enabling password control ································································································································· 167
Setting global password control parameters ···································································································· 167
Setting user group password control parameters ···························································································· 168
Setting local user password control parameters ······························································································ 169
Setting super password control parameters ····································································································· 170
Setting a local user password in interactive mode ·························································································· 170
Displaying and maintaining password control ········································································································· 170
Password control configuration example ·················································································································· 171
HABP configuration ···················································································································································· 174
HABP overview ····························································································································································· 174
Configuring HABP ························································································································································ 175
Configuring the HABP server ····························································································································· 175
Configuring an HABP client ······························································································································· 175
Displaying and maintaining HABP····························································································································· 176
HABP configuration example ······································································································································ 176
Network requirements ········································································································································· 176
Configuration procedure ···································································································································· 177
Public key configuration ············································································································································· 179
Asymmetric key algorithm overview ·························································································································· 179
Basic concepts ····················································································································································· 179
vi

Advertisement

Table of Contents
loading

Table of Contents