HP 4100 Series Manuals

Manuals and User Guides for HP 4100 Series. We have 1 HP 4100 Series manual available for free PDF download: Manual

HP 4100 Series Manual

HP 4100 Series Manual (300 pages)

Brand: HP | Category: Switch | Size: 3.68 MB
Table of contents
Table Of Contents5................................................................................................................................................................
Getting Started5................................................................................................................................................................
Configuring Username And Password Security5................................................................................................................................................................
Pwr And 2800 Switches6................................................................................................................................................................
Tacacs+ Authentication6................................................................................................................................................................
Radius Authentication And Accounting7................................................................................................................................................................
Configuring Secure Shell (ssh)8................................................................................................................................................................
Configuring And Monitoring Port Security10................................................................................................................................................................
Using Authorized Ip Managers11................................................................................................................................................................
Contents13................................................................................................................................................................
Introduction And Applicable Switches14................................................................................................................................................................
About The Feature Descriptions14................................................................................................................................................................
Overview Of Access Security Features15................................................................................................................................................................
General Switch Traffic Security Guideline17................................................................................................................................................................
Command Syntax Conventions18................................................................................................................................................................
Simulating Display Output18................................................................................................................................................................
Command Prompts18................................................................................................................................................................
Screen Simulations19................................................................................................................................................................
Port Identity Convention For Examples19................................................................................................................................................................
Related Publications19................................................................................................................................................................
Getting Documentation From The Web21................................................................................................................................................................
Sources For More Information22................................................................................................................................................................
Need Only A Quick Start?23................................................................................................................................................................
Need Only A Quick Start23................................................................................................................................................................
To Set Up And Install The Switch In Your Network23................................................................................................................................................................
Overview26................................................................................................................................................................
Configuring Local Password Security28................................................................................................................................................................
Menu: Setting Passwords28................................................................................................................................................................
Cli: Setting Passwords And Usernames29................................................................................................................................................................
Web: Setting Passwords And Usernames30................................................................................................................................................................
Front-panel Security31................................................................................................................................................................
When Security Is Important31................................................................................................................................................................
Front-panel Button Functions33................................................................................................................................................................
Configuring Front-panel Security36................................................................................................................................................................
Password Recovery41................................................................................................................................................................
Password Recovery Process43................................................................................................................................................................
Client Options47................................................................................................................................................................
General Features48................................................................................................................................................................
How Web And Mac Authentication Operate49................................................................................................................................................................
Terminology53................................................................................................................................................................
Operating Rules And Notes54................................................................................................................................................................
General Setup Procedure For Web/mac Authentication56................................................................................................................................................................
Do These Steps Before You Configure Web/mac Authentication56................................................................................................................................................................
Mac Authentication58................................................................................................................................................................
Configuring The Switch To Access A Radius Server59................................................................................................................................................................
Configuring Web Authentication On The Switch61................................................................................................................................................................
Configure The Switch For Web-based Authentication62................................................................................................................................................................
Configuring Mac Authentication On The Switch66................................................................................................................................................................
Configure The Switch For Mac-based Authentication67................................................................................................................................................................
Show Status And Configuration Of Web-based Authentication70................................................................................................................................................................
Show Status And Configuration Of Mac-based Authentication72................................................................................................................................................................
Client Status74................................................................................................................................................................
Terminology Used In Tacacs Applications:77................................................................................................................................................................
Terminology Used In Tacacs Applications77................................................................................................................................................................
General System Requirements79................................................................................................................................................................
General Authentication Setup Procedure79................................................................................................................................................................
Configuring Tacacs+ On The Switch82................................................................................................................................................................
Beforeyou Begin82................................................................................................................................................................
Cli Commands Described In This Section83................................................................................................................................................................
Viewing The Switch's Current Authentication Configuration83................................................................................................................................................................
Contact Configuration84................................................................................................................................................................
Configuring The Switch's Authentication Methods85................................................................................................................................................................
Configuring The Switch's Tacacs+ Server Access89................................................................................................................................................................
How Authentication Operates94................................................................................................................................................................
General Authentication Process Using A Tacacs+ Server94................................................................................................................................................................
Local Authentication Process96................................................................................................................................................................
Using The Encryption Key97................................................................................................................................................................
Authentication98................................................................................................................................................................
Controlling Web Browser Interface Access When Using Tacacs98................................................................................................................................................................
Messages Related To Tacacs+ Operation99................................................................................................................................................................
Switch Operating Rules For Radius104................................................................................................................................................................
General Radius Setup Procedure105................................................................................................................................................................
Configuring The Switch For Radius Authentication106................................................................................................................................................................
Outline Of The Steps For Configuring Radius Authentication106................................................................................................................................................................
To Protect108................................................................................................................................................................
Configure The Switch To Access A Radius Server110................................................................................................................................................................
Configure The Switch's Global Radius Parameters112................................................................................................................................................................
Controlling Web Browser Interface Access When Using Radius117................................................................................................................................................................
Configuring Radius Accounting117................................................................................................................................................................
Operating Rules For Radius Accounting119................................................................................................................................................................
Steps For Configuring Radius Accounting119................................................................................................................................................................
Reports To The Radius Server122................................................................................................................................................................
Viewing Radius Statistics125................................................................................................................................................................
General Radius Statistics125................................................................................................................................................................
Radius Authentication Statistics127................................................................................................................................................................
Radius Accounting Statistics128................................................................................................................................................................
Changing Radius-server Access Order129................................................................................................................................................................
Messages Related To Radius Operation131................................................................................................................................................................
Prerequisite For Using Ssh137................................................................................................................................................................
Public Key Formats137................................................................................................................................................................
Client Authentication138................................................................................................................................................................
General Operating Rules And Notes140................................................................................................................................................................
Configuring The Switch For Ssh Operation141................................................................................................................................................................
Generating The Switch's Public And Private Key Pair142................................................................................................................................................................
Providing The Switch's Public Key To Clients144................................................................................................................................................................
Behavior147................................................................................................................................................................
Configuring The Switch For Ssh Authentication150................................................................................................................................................................
Use An Ssh Client To Access The Switch153................................................................................................................................................................
Further Information On Ssh Client Public-key Authentication153................................................................................................................................................................
Messages Related To Ssh Operation159................................................................................................................................................................
Prerequisite For Using Ssl165................................................................................................................................................................
Configuring The Switch For Ssl Operation167................................................................................................................................................................
Generating The Switch's Server Host Certificate169................................................................................................................................................................
Comments On Certificate Fields171................................................................................................................................................................
Common Errors In Ssl Setup181................................................................................................................................................................
Why Use Port-based Access Control185................................................................................................................................................................
How 802.1x Operates188................................................................................................................................................................
Switch-port Supplicant Operation189................................................................................................................................................................
General Setup Procedure For Port-based Access Control (802.1x)194................................................................................................................................................................
Do These Steps Before You Configure 802.1x Operation194................................................................................................................................................................
Overview: Configuring 802.1x Authentication On The Switch195................................................................................................................................................................
Configuring Switch Ports As 802.1x Authenticators197................................................................................................................................................................
Enable 802.1x Authentication On Selected Ports197................................................................................................................................................................
Configure The 802.1x Authentication Method201................................................................................................................................................................
Enter The Radius Host Ip Address(es)202................................................................................................................................................................
X Open Vlan Mode203................................................................................................................................................................
Use Models For 802.1x Open Vlan Modes204................................................................................................................................................................
Unauthorized-client Vlans207................................................................................................................................................................
Setting Up And Configuring 802.1x Open Vlan Mode209................................................................................................................................................................
X Open Vlan Operating Notes213................................................................................................................................................................
X Devices214................................................................................................................................................................
Option For Authenticator Ports: Configure Port-security To Allow Only214................................................................................................................................................................
To Other Switches216................................................................................................................................................................
Displaying 802.1x Configuration, Statistics, And Counters220................................................................................................................................................................
Show Commands For Port-access Authenticator220................................................................................................................................................................
Viewing 802.1x Open Vlan Mode Status222................................................................................................................................................................
Show Commands For Port-access Supplicant225................................................................................................................................................................
How Radius/802.1x Authentication Affects Vlan Operation226................................................................................................................................................................
Messages Related To 802.1x Operation230................................................................................................................................................................
Basic Operation232................................................................................................................................................................
Blocking Unauthorized Traffic233................................................................................................................................................................
Trunk Group Exclusion234................................................................................................................................................................
Planning Port Security235................................................................................................................................................................
Port Security Command Options And Operation236................................................................................................................................................................
Retention Of Static Mac Addresses240................................................................................................................................................................
Displaying Current Port Security Settings240................................................................................................................................................................
Configuring Port Security242................................................................................................................................................................
Mac Lockdown247................................................................................................................................................................
Differences Between Mac Lockdown And Port Security249................................................................................................................................................................
Deploying Mac Lockdown251................................................................................................................................................................
Mac Lockout255................................................................................................................................................................
Port Security And Mac Lockout257................................................................................................................................................................
Web: Displaying And Configuring Port Security Features257................................................................................................................................................................
Reading Intrusion Alerts And Resetting Alert Flags258................................................................................................................................................................
Notice Of Security Violations258................................................................................................................................................................
How The Intrusion Log Operates259................................................................................................................................................................
Keeping The Intrusion Log Current By Resetting Alert Flags259................................................................................................................................................................
Using The Event Log To Find Intrusion Alerts265................................................................................................................................................................
Operating Notes For Port Security266................................................................................................................................................................
Traffic/security Filters269................................................................................................................................................................
Hp Procurve Series 2600/2600-pwr And 2800 Switches269................................................................................................................................................................
Using Source-port Filters272................................................................................................................................................................
Operating Rules For Source-port Filters272................................................................................................................................................................
Configuring A Source-port Filter273................................................................................................................................................................
Viewing A Source-port Filter275................................................................................................................................................................
Filter Indexing276................................................................................................................................................................
Editing A Source-port Filter277................................................................................................................................................................
Options281................................................................................................................................................................
Access Levels281................................................................................................................................................................
Defining Authorized Management Stations282................................................................................................................................................................
Overview Of Ip Mask Operation282................................................................................................................................................................
Menu: Viewing And Configuring Ip Authorized Managers283................................................................................................................................................................
Cli: Viewing And Configuring Authorized Ip Managers284................................................................................................................................................................
Configuring Ip Authorized Managers For The Switch285................................................................................................................................................................
Web: Configuring Ip Authorized Managers287................................................................................................................................................................
Building Ip Masks287................................................................................................................................................................
Configuring One Station Per Authorized Manager Ip Entry287................................................................................................................................................................
Configuring Multiple Stations Per Authorized Manager Ip Entry289................................................................................................................................................................
Additional Examples For Authorizing Multiple Stations291................................................................................................................................................................

Advertising

Share and save

Advertising