HP 5120 SI Series Manuals

Manuals and User Guides for HP 5120 SI Series. We have 3 HP 5120 SI Series manuals available for free PDF download: Security Configuration Manual, Installation Manual, Specification

HP 5120 SI Series Security Configuration Manual

HP 5120 SI Series Security Configuration Manual (385 pages)

Brand: HP | Category: Network Router | Size: 3.63 MB
Table of contents
Configuration Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Aaa Configuration13................................................................................................................................................................
Radius14................................................................................................................................................................
Hwtacacs20................................................................................................................................................................
Domain-based User Management22................................................................................................................................................................
Protocols And Standards23................................................................................................................................................................
Fips Compliance26................................................................................................................................................................
Configuring Aaa Schemes28................................................................................................................................................................
Configuring Radius Schemes32................................................................................................................................................................
Configuring Hwtacacs Schemes43................................................................................................................................................................
Configuring Aaa Methods For Isp Domains48................................................................................................................................................................
Configuration Prerequisites49................................................................................................................................................................
Configuring Aaa Authentication Methods For An Isp Domain50................................................................................................................................................................
Configuring Aaa Authorization Methods For An Isp Domain52................................................................................................................................................................
Configuring Aaa Accounting Methods For An Isp Domain54................................................................................................................................................................
Tearing Down User Connections Forcibly55................................................................................................................................................................
Displaying And Maintaining Aaa56................................................................................................................................................................
Aaa For Telnet Users By Separate Servers58................................................................................................................................................................
Authentication/authorization For Ssh/telnet Users By A Radius Server59................................................................................................................................................................
Level Switching Authentication For Telnet Users By An Hwtacacs Server63................................................................................................................................................................
Troubleshooting Aaa67................................................................................................................................................................
Troubleshooting Hwtacacs68................................................................................................................................................................
X Fundamentals69................................................................................................................................................................
X-related Protocols70................................................................................................................................................................
Eap Over Radius72................................................................................................................................................................
X Authentication Procedures73................................................................................................................................................................
Eap Relay74................................................................................................................................................................
Eap Termination75................................................................................................................................................................
X Configuration77................................................................................................................................................................
Configuring 802.1x82................................................................................................................................................................
Enabling 802.1x83................................................................................................................................................................
Specifying Eap Relay Or Eap Termination84................................................................................................................................................................
Specifying An Access Control Method85................................................................................................................................................................
Setting The Maximum Number Of Authentication Request Attempts86................................................................................................................................................................
Configuring The Online User Handshake Function87................................................................................................................................................................
Configuring The Authentication Trigger Function88................................................................................................................................................................
Enabling The Quiet Timer89................................................................................................................................................................
Configuring An 802.1x Guest Vlan90................................................................................................................................................................
Configuring An Auth-fail Vlan91................................................................................................................................................................
Configuring An 802.1x Critical Vlan92................................................................................................................................................................
Specifying Supported Domain Name Delimiters93................................................................................................................................................................
X Configuration Examples94................................................................................................................................................................
X With Guest Vlan And Vlan Assignment Configuration Example96................................................................................................................................................................
X With Acl Assignment Configuration Example99................................................................................................................................................................
Ead Fast Deployment Configuration101................................................................................................................................................................
Configuration Procedure102................................................................................................................................................................
Displaying And Maintaining Ead Fast Deployment103................................................................................................................................................................
Troubleshooting Ead Fast Deployment105................................................................................................................................................................
Mac Authentication Configuration107................................................................................................................................................................
Mac Authentication Timers108................................................................................................................................................................
Acl Assignment109................................................................................................................................................................
Basic Configuration For Mac Authentication110................................................................................................................................................................
Specifying An Authentication Domain For Mac Authentication Users111................................................................................................................................................................
Configuring A Mac Authentication Guest Vlan112................................................................................................................................................................
Configuring A Mac Authentication Critical Vlan113................................................................................................................................................................
Mac Authentication Configuration Examples114................................................................................................................................................................
Radius-based Mac Authentication Configuration Example115................................................................................................................................................................
Acl Assignment Configuration Example117................................................................................................................................................................
Portal Configuration120................................................................................................................................................................
Portal System Using The Local Portal Server122................................................................................................................................................................
Portal Authentication Modes123................................................................................................................................................................
Layer 2 Portal Authentication Process124................................................................................................................................................................
Layer 3 Portal Authentication Process125................................................................................................................................................................
Portal Configuration Task List128................................................................................................................................................................
Specifying The Portal Server130................................................................................................................................................................
Configuring The Local Portal Server131................................................................................................................................................................
Enabling Portal Authentication135................................................................................................................................................................
Controlling Access Of Portal Users136................................................................................................................................................................
Configuring An Authentication Source Subnet137................................................................................................................................................................
Setting The Maximum Number Of Online Portal Users138................................................................................................................................................................
Configuring Layer 2 Portal Authentication To Support Web Proxy139................................................................................................................................................................
Specifying An Auth-fail Vlan For Portal Authentication140................................................................................................................................................................
Specifying Nas-port-type For An Interface141................................................................................................................................................................
Specifying A Source Ip Address For Outgoing Portal Packets142................................................................................................................................................................
Configuring Portal Detection Functions143................................................................................................................................................................
Configuring Portal User Information Synchronization145................................................................................................................................................................
Logging Off Portal Users146................................................................................................................................................................
Portal Configuration Examples147................................................................................................................................................................
Configuring Cross-subnet Portal Authentication154................................................................................................................................................................
Configuring Direct Portal Authentication With Extended Functions156................................................................................................................................................................
Configuring Cross-subnet Portal Authentication With Extended Functions158................................................................................................................................................................
Configuring Portal Server Detection And Portal User Information Synchronization160................................................................................................................................................................
Configuring Layer 2 Portal Authentication168................................................................................................................................................................
Troubleshooting Portal171................................................................................................................................................................
Incorrect Server Port Number On The Access Device172................................................................................................................................................................
Triple Authentication Configuration173................................................................................................................................................................
Extended Functions174................................................................................................................................................................
Triple Authentication Configuration Task List175................................................................................................................................................................
Triple Authentication Supporting Vlan Assignment And Auth-fail Vlan Configuration Example178................................................................................................................................................................
Port Security Configuration183................................................................................................................................................................
Port Security Features184................................................................................................................................................................
Support For Guest Vlan And Auth-fail Vlan186................................................................................................................................................................
Port Security Configuration Task List187................................................................................................................................................................
Setting The Maximum Number Of Secure Mac Addresses188................................................................................................................................................................
Configuring Port Security Features190................................................................................................................................................................
Configuring Port Security Traps191................................................................................................................................................................
Displaying And Maintaining Port Security193................................................................................................................................................................
Configuring The Userloginwithoui Mode195................................................................................................................................................................
Verify The Configuration197................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode199................................................................................................................................................................
Configuration Information200................................................................................................................................................................
Troubleshooting Port Security202................................................................................................................................................................
Cannot Change Port Security Mode When A User Is Online203................................................................................................................................................................
User Profile Configuration204................................................................................................................................................................
Creating A User Profile205................................................................................................................................................................
Enabling A User Profile206................................................................................................................................................................
Password Control Configuration207................................................................................................................................................................
Password Control Configuration Task List210................................................................................................................................................................
Setting Global Password Control Parameters211................................................................................................................................................................
Setting User Group Password Control Parameters212................................................................................................................................................................
Setting Local User Password Control Parameters213................................................................................................................................................................
Setting A Local User Password In Interactive Mode214................................................................................................................................................................
Password Control Configuration Example215................................................................................................................................................................
Habp Configuration218................................................................................................................................................................
Configuring Habp219................................................................................................................................................................
Displaying And Maintaining Habp220................................................................................................................................................................
Public Key Configuration223................................................................................................................................................................
Asymmetric Key Algorithm Applications224................................................................................................................................................................
Displaying Or Exporting The Local Rsa Or Dsa Host Public Key225................................................................................................................................................................
Configuring A Remote Host's Public Key226................................................................................................................................................................
Displaying And Maintaining Public Keys227................................................................................................................................................................
Importing A Remote Host's Public Key From A Public Key File229................................................................................................................................................................
Pki Configuration232................................................................................................................................................................
Architecture Of Pki233................................................................................................................................................................
Applications Of Pki234................................................................................................................................................................
Pki Configuration Task List235................................................................................................................................................................
Configuring A Pki Domain236................................................................................................................................................................
Submitting A Pki Certificate Request238................................................................................................................................................................
Submitting A Certificate Request In Manual Mode239................................................................................................................................................................
Retrieving A Certificate Manually240................................................................................................................................................................
Destroying A Local Rsa Key Pair242................................................................................................................................................................
Displaying And Maintaining Pki243................................................................................................................................................................
Network Requirements244................................................................................................................................................................
Requesting A Certificate From A Ca Running Windows 2003 Server247................................................................................................................................................................
Configuring A Certificate Attribute-based Access Control Policy250................................................................................................................................................................
Troubleshooting Pki251................................................................................................................................................................
Failed To Request A Local Certificate252................................................................................................................................................................
Failed To Retrieve Crls253................................................................................................................................................................
Ssh2.0 Configuration254................................................................................................................................................................
Enabling The Ssh Server Function258................................................................................................................................................................
Configuring A Client Public Key259................................................................................................................................................................
Configuring An Ssh User260................................................................................................................................................................
Setting The Ssh Management Parameters261................................................................................................................................................................
Configuring The Device As An Ssh Client262................................................................................................................................................................
Establishing A Connection Between The Ssh Client And Server263................................................................................................................................................................
Displaying And Maintaining Ssh264................................................................................................................................................................
Ssh Server Configuration Examples265................................................................................................................................................................
When Switch Acts As Server For Publickey Authentication267................................................................................................................................................................
Ssh Client Configuration Examples272................................................................................................................................................................
When Switch Acts As Client For Publickey Authentication275................................................................................................................................................................
Sftp Configuration278................................................................................................................................................................
Configuring The Sftp Connection Idle Timeout Period279................................................................................................................................................................
Working With Sftp Directories280................................................................................................................................................................
Working With Sftp Files281................................................................................................................................................................
Sftp Client Configuration Example282................................................................................................................................................................
Sftp Server Configuration Example285................................................................................................................................................................
Scp Configuration288................................................................................................................................................................
Configuring The Switch As The Scp Client289................................................................................................................................................................
Scp Server Configuration Example290................................................................................................................................................................
Ssl Configuration292................................................................................................................................................................
Ssl Protocol Stack293................................................................................................................................................................
Ssl Server Policy Configuration Example295................................................................................................................................................................
Configuring An Ssl Client Policy297................................................................................................................................................................
Displaying And Maintaining Ssl298................................................................................................................................................................
Tcp Attack Protection Configuration300................................................................................................................................................................
Enabling Protection Against Naptha Attacks301................................................................................................................................................................
Ip Source Guard Configuration302................................................................................................................................................................
Configuring Ipv4 Source Guard303................................................................................................................................................................
Configuring Dynamic Ipv4 Source Guard304................................................................................................................................................................
Setting The Maximum Number Of Ipv4 Source Guard Entries305................................................................................................................................................................
Configuring Dynamic Ipv6 Source Guard306................................................................................................................................................................
Setting The Maximum Number Of Ipv6 Source Guard Entries307................................................................................................................................................................
Ip Source Guard Configuration Examples308................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Snooping Configuration Example309................................................................................................................................................................
Dynamic Ipv4 Source Guard Using Dhcp Relay Configuration Example311................................................................................................................................................................
Static Ipv6 Source Guard Configuration Example312................................................................................................................................................................
Dynamic Ipv6 Source Guard Using Nd Snooping Configuration Example314................................................................................................................................................................
Troubleshooting Ip Source Guard315................................................................................................................................................................
Arp Attack Protection Configuration316................................................................................................................................................................
Configuring Arp Packet Rate Limit317................................................................................................................................................................
Configuring Source Mac Address Based Arp Attack Detection318................................................................................................................................................................
Displaying And Maintaining Source Mac Address Based Arp Attack Detection319................................................................................................................................................................
Configuring Arp Detection320................................................................................................................................................................
Configuring Arp Detection Based On Specified Objects321................................................................................................................................................................
Configuring Arp Restricted Forwarding322................................................................................................................................................................
Arp Detection Configuration Example I323................................................................................................................................................................
Arp Detection Configuration Example Ii324................................................................................................................................................................
Arp Restricted Forwarding Configuration Example325................................................................................................................................................................
Configuring Arp Gateway Protection327................................................................................................................................................................
Arp Gateway Protection Configuration Example328................................................................................................................................................................
Configuring Arp Filtering329................................................................................................................................................................
Nd Attack Defense Configuration331................................................................................................................................................................
Enabling Source Mac Consistency Check For Nd Packets332................................................................................................................................................................
Configuring Nd Detection333................................................................................................................................................................
Displaying And Maintaining Nd Detection334................................................................................................................................................................
Savi Configuration337................................................................................................................................................................
Savi Configuration In Dhcpv6-only Address Assignment Scenario338................................................................................................................................................................
Savi Configuration In Slaac-only Address Assignment Scenario340................................................................................................................................................................
Savi Configuration In Dhcpv6+slaac Address Assignment Scenario342................................................................................................................................................................
System-guard Configuration345................................................................................................................................................................
Displaying System-guard346................................................................................................................................................................
Configuring Fips347................................................................................................................................................................
Triggering A Self-test349................................................................................................................................................................
Verifying The Configuration350................................................................................................................................................................
Configuring Ipsec352................................................................................................................................................................
Configuring Acls356................................................................................................................................................................
Configuring An Ipsec Proposal357................................................................................................................................................................
Configuring An Ipsec Policy358................................................................................................................................................................
Applying An Ipsec Policy Group To An Interface361................................................................................................................................................................
Configuring The Ipsec Session Idle Timeout362................................................................................................................................................................
Configuring The Ipsec Anti-replay Function363................................................................................................................................................................
Displaying And Maintaining Ipsec364................................................................................................................................................................
Configuring Ike367................................................................................................................................................................
Ike Functions368................................................................................................................................................................
Relationship Between Ike And Ipsec369................................................................................................................................................................
Configuring A Name For The Local Security Gateway370................................................................................................................................................................
Configuring An Ike Peer371................................................................................................................................................................
Setting Keepalive Timers373................................................................................................................................................................
Configuring A Dpd Detector374................................................................................................................................................................
Displaying And Maintaining Ike375................................................................................................................................................................
Troubleshooting Ike378................................................................................................................................................................
Failing To Establish An Ipsec Tunnel379................................................................................................................................................................
Support And Other Resources380................................................................................................................................................................
Command Conventions381................................................................................................................................................................

Advertising

HP 5120 SI Series Installation Manual

HP 5120 SI Series Installation Manual (48 pages)

Brand: HP | Category: Switch | Size: 2.35 MB
Table of contents
Installation Guide1................................................................................................................................................................
Table Of Contents3................................................................................................................................................................
Preparing For Installation5................................................................................................................................................................
Examining The Installation Site6................................................................................................................................................................
Laser Safety7................................................................................................................................................................
Installation Accessories8................................................................................................................................................................
Installing The Switch10................................................................................................................................................................
Mounting Brackets And Mounting Positions11................................................................................................................................................................
Rack-mounting The Switch13................................................................................................................................................................
Mounting The Switch On A Workbench15................................................................................................................................................................
Grounding The Switch With A Grounding Conductor Buried In The Earth Ground17................................................................................................................................................................
Grounding The Switch By Using The Ac Power Cord18................................................................................................................................................................
Connecting The Power Cord19................................................................................................................................................................
Verifying The Installation20................................................................................................................................................................
Accessing The Switch For The First Time21................................................................................................................................................................
Setting Terminal Parameters22................................................................................................................................................................
Setting Up An Irf Fabric23................................................................................................................................................................
Planning Irf Fabric Setup24................................................................................................................................................................
Planning Irf Topology And Connections25................................................................................................................................................................
Identifying Physical Irf Ports On The Member Switches26................................................................................................................................................................
Configuring Basic Irf Settings27................................................................................................................................................................
Maintenance And Troubleshooting28................................................................................................................................................................
Configuration Terminal Problems29................................................................................................................................................................
Appendix A Chassis Views And Technical Specifications30................................................................................................................................................................
G Poe+ (65w) Si31................................................................................................................................................................
G Poe+ (180w) Si32................................................................................................................................................................
G Poe+ (370w) Si33................................................................................................................................................................
Technical Specifications34................................................................................................................................................................
Ac Input Voltage Specifications35................................................................................................................................................................
Appendix B Frus And Compatibility Matrixes37................................................................................................................................................................
Appendix C Ports And Leds39................................................................................................................................................................
Power Led40................................................................................................................................................................
Base-t Ethernet Port Led41................................................................................................................................................................
Base-x Sfp Port Led42................................................................................................................................................................
Document Conventions And Icons43................................................................................................................................................................
Network Topology Icons44................................................................................................................................................................
Support And Other Resources45................................................................................................................................................................
Websites46................................................................................................................................................................
Index47................................................................................................................................................................
HP 5120 SI Series Specification

HP 5120 SI Series Specification (33 pages)

HP 5120 SI Switch Series  
Brand: HP | Category: Switch | Size: 0.57 MB

Advertising

Share and save

Advertising