HP 5920 Series Configuration Manual page 5

Hide thumbs Also See for 5920 Series:
Table of Contents

Advertisement

Configuration task list ···················································································································································· 85
Enabling port security ···················································································································································· 85
Setting port security's limit on the number of secure MAC addresses on a port ···················································· 86
Setting the port security mode ······································································································································ 86
Configuring port security features ································································································································ 87
Configuring NTK ··················································································································································· 87
Configuring intrusion protection ·························································································································· 88
Configuring secure MAC addresses ···························································································································· 88
Configuration prerequisites ·································································································································· 89
Configuration procedure ······································································································································ 89
Ignoring authorization information from the server ···································································································· 90
Displaying and maintaining port security ···················································································································· 90
autoLearn configuration example ································································································································· 90
Network requirements ··········································································································································· 90
Configuration procedure ······································································································································ 91
Verifying the configuration ··································································································································· 91
userLoginWithOUI configuration example ·················································································································· 92
Network requirements ··········································································································································· 92
Configuration procedure ······································································································································ 93
Verifying the configuration ··································································································································· 94
macAddressElseUserLoginSecure configuration example ························································································· 95
Network requirements ··········································································································································· 95
Configuration procedure ······································································································································ 96
Verifying the configuration ··································································································································· 96
Troubleshooting port security ········································································································································ 98
Cannot set the port security mode ······················································································································· 98
Cannot configure secure MAC addresses ·········································································································· 99
Configuring password control ································································································································ 100
Overview ······································································································································································· 100
Password setting ·················································································································································· 100
Password updating and expiration ··················································································································· 101
User login control ················································································································································ 102
Password not displayed in any form ················································································································· 102
Logging ································································································································································· 102
Password control configuration task list ····················································································································· 103
Enabling password control ········································································································································· 103
Setting global password control parameters ···································································································· 104
Setting user group password control parameters ···························································································· 104
Setting local user password control parameters ······························································································ 105
Setting super password control parameters ····································································································· 106
Displaying and maintaining password control ········································································································· 106
Password control configuration example ·················································································································· 106
Managing public keys ············································································································································ 109
Overview ······································································································································································· 109
Creating a local key pair ············································································································································ 109
Configuration guidelines ···································································································································· 109
Configuration procedure ···································································································································· 110
Distributing a local host public key ···························································································································· 110
Exporting a host public key in a specific format to a file ················································································ 111
Displaying a host public key in a specific format and saving it to a file ······················································ 111
Displaying a host public key ······························································································································ 111
Destroying a local key pair ········································································································································· 112
Configuring a peer public key ···································································································································· 112
iii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

5900 series

Table of Contents