HP 3600 v2 Series Security Configuration Manual page 6

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Portal configuration examples ···································································································································· 156
Configuring direct portal authentication ··········································································································· 156
Configuring re-DHCP portal authentication ······································································································ 161
Configuring cross-subnet portal authentication ································································································ 163
Configuring direct portal authentication with extended functions·································································· 165
Configuring re-DHCP portal authentication with extended functions ···························································· 167
Configuring cross-subnet portal authentication with extended functions ······················································· 169
Configuring portal stateful failover ···················································································································· 171
Configuring portal server detection and portal user information synchronization ······································· 179
Configuring Layer 2 portal authentication ········································································································ 185
Troubleshooting portal ················································································································································· 188
Inconsistent keys on the access device and the portal server ········································································· 188
Incorrect server port number on the access device ·························································································· 189
Triple authentication configuration ························································································································ 190
Triple authentication overview ···································································································································· 190
Triple authentication mechanism ······················································································································· 190
Using triple authentication with other features ································································································· 191
Configuring triple authentication ································································································································ 192
Triple authentication configuration examples ··········································································································· 192
Triple authentication basic function configuration example ··········································································· 192
Port security configuration ······································································································································ 200
Port security overview ·················································································································································· 200
Port security features ··········································································································································· 200
Port security modes ············································································································································· 200
Working with guest VLAN and Auth-Fail VLAN ······························································································ 203
Port security configuration task list ····························································································································· 203
Enabling port security ·················································································································································· 204
Configuration prerequisites ································································································································ 204
Configuration procedure ···································································································································· 204
Setting port security's limit on the number of MAC addresses on a port ······························································· 204
Setting the port security mode ···································································································································· 205
Configuration prerequisites ································································································································ 205
Configuration procedure ···································································································································· 205
Configuring port security features ······························································································································ 206
Configuring NTK ················································································································································· 206
Configuring intrusion protection ························································································································ 206
Enabling port security traps ································································································································ 207
Configuring secure MAC addresses ·························································································································· 208
Configuration prerequisites ································································································································ 208
Configuration procedure ···································································································································· 209
Ignoring authorization information from the server ·································································································· 209
Displaying and maintaining port security ·················································································································· 210
Port security configuration examples ························································································································· 210
Configuring the autoLearn mode ······················································································································· 210
Configuring the userLoginWithOUI mode ········································································································ 213
Configuring the macAddressElseUserLoginSecure mode ················································································ 217
Troubleshooting port security ······································································································································ 220
Cannot set the port security mode ····················································································································· 220
Cannot configure secure MAC addresses ········································································································ 220
Cannot change port security mode when a user is online ·············································································· 220
User profile configuration ······································································································································· 222
User profile overview ··················································································································································· 222
iv
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents