HP 3500yl Series Access Security Manual page 764

Switch software
Hide thumbs Also See for 3500yl Series:
Table of Contents

Advertisement

RADIUS
See RADIUS.
saving security credentials in multiple
files ... 2-27
SSH
See SSH.
storage of security credentials
connection-rate ACL ... 3-5
connection-rate filtering
access-control list ... 3-4
ACL
ACE mask ... 3-25
application to port ... 3-20
applying ... 3-25
CIDR notation ... 3-25
configuring ... 3-18
example ... 3-26, 3-27
filter ... 3-19, 3-21, 3-22, 3-29
ignore ... 3-19, 3-21, 3-22, 3-28
implicit filter ... 3-19, 3-29
operation ... 3-19
source IP ... 3-20
UDP/TCP ... 3-22
UDP/TCP options ... 3-23
UDP/TCP port data ... 3-24
VLAN effect ... 3-19
activation ... 3-3, 3-5
benefits ... 3-2
block ... 3-11
blocked host ... 3-4, 3-6, 3-16, 3-17
blocked host, re-enable ... 3-4, 3-8
configuration, example ... 3-13
configuring per-port ... 3-11
edge of network ... 3-1
enabling, commands ... 3-10
event log notice ... 3-4
exception for, configuring ... 10-21
false positive ... 3-4
guidelines ... 3-7, 3-8
high rate, legitimate ... 3-17
host, trusted ... 3-17
host, unblocking ... 3-17
ICMP ping message ... 3-1
IPv6 not supported ... 3-5
notify and reduce ... 3-4
notify only ... 3-4
notify-only ... 3-11
operating rules ... 3-5
8 – Index
operation ... 3-3
options ... 3-3
penalty period, throttling ... 3-11
port setting change, effect ... 3-6
reboot, effect ... 3-6
recommended application ... 3-1
re-enable blocked host ... 3-6
routed traffic ... 3-9
sensitivity level ... 3-4, 3-7
sensitivity level, changing ... 3-17
sensitivity level, command ... 3-10
show, command ... 3-14, 3-16
signature recognition ... 3-1, 3-2
SNMP trap ... 3-4
throttle ... 3-4, 3-5, 3-11
trigger ... 3-3, 3-5, 3-9
unblock command ... 3-8, 3-17
unblocking a host ... 3-6
VLAN delete, effect ... 3-6
worm ... 3-1, 3-2
console
authorized IP managers, configuring ... 15-5
control bits, TCP ... 10-69
CoS
configuring for a RADIUS server ... 7-1
override ... 7-3, 13-64
priority assignment ... 6-2
RADIUS client ... 7-8
viewing per-port config ... 7-7
crypto
babble ... 8-11
fingerprint ... 8-11
D
DA, defined ... 7-12, 10-9, 10-11
database, snooping ... 11-5
debug logging
DHCP snooping ... 11-13
default configuration and security ... 1-13
default settings
802.1X
access control, none ... 1-5
aaa authentication parameters ... 5-12
aaa port-access mac-based ... 4-52–4-53
aaa port-access web-based ... 4-22–4-25
ACLs, none ... 1-4
authorized ip managers, none ... 1-4

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents