HPE FlexNetwork 7500 Series Security Configuration Manual page 7

Table of Contents

Advertisement

No portal authentication page is pushed for users ················································································· 221
Cannot log out portal users on the access device ················································································· 222
Cannot log out portal users on the RADIUS server ··············································································· 222
Users logged out by the access device still exist on the portal authentication server···························· 222
Re-DHCP portal authenticated users cannot log in successfully ··························································· 223
Configuring port security ············································································· 224
Overview ························································································································································ 224
Port security features ····························································································································· 224
Port security modes ······························································································································· 224
Configuration task list ····································································································································· 227
Enabling port security ···································································································································· 228
Setting port security's limit on the number of secure MAC addresses on a port ············································ 228
Setting the port security mode ······················································································································· 229
Configuring port security features ·················································································································· 230
Configuring NTK ····································································································································· 230
Configuring intrusion protection ············································································································· 230
Configuring secure MAC addresses ·············································································································· 231
Configuration prerequisites ···················································································································· 232
Configuration procedure ························································································································· 232
Ignoring authorization information from the server ························································································ 233
Enabling MAC move ······································································································································ 233
Enabling the authorization-fail-offline feature ································································································· 233
Applying a NAS-ID profile to port security ······································································································ 234
Enabling SNMP notifications for port security ································································································ 235
Displaying and maintaining port security ······································································································· 235
Port security configuration examples ············································································································· 235
autoLearn configuration example ··········································································································· 235
userLoginWithOUI configuration example ······························································································ 237
macAddressElseUserLoginSecure configuration example ···································································· 240
Troubleshooting port security ························································································································· 244
Cannot set the port security mode ········································································································· 244
Cannot configure secure MAC addresses ····························································································· 244
Configuring password control ····································································· 245
Overview ························································································································································ 245
Password setting ···································································································································· 245
Password updating and expiration ········································································································· 246
User login control ··································································································································· 247
Password not displayed in any form ······································································································ 248
Logging ·················································································································································· 248
FIPS compliance ············································································································································ 248
Password control configuration task list ········································································································· 248
Enabling password control ····························································································································· 249
Setting global password control parameters ·································································································· 249
Setting user group password control parameters ·························································································· 250
Setting local user password control parameters ···························································································· 251
Setting super password control parameters ·································································································· 252
Displaying and maintaining password control ································································································ 252
Password control configuration example ······································································································· 253
Network requirements ···························································································································· 253
Configuration procedure ························································································································· 253
Verifying the configuration ······················································································································ 255
Configuring keychains ················································································· 256
Overview ························································································································································ 256
Configuration procedure ································································································································ 256
Displaying and maintaining keychain ············································································································· 257
Keychain configuration example ···················································································································· 257
Network requirements ···························································································································· 257
Configuration procedure ························································································································· 258
Verifying the configuration ······················································································································ 259
v

Advertisement

Table of Contents
loading

Table of Contents