HP ProCurve 2510-24 Manuals

Manuals and User Guides for HP ProCurve 2510-24. We have 3 HP ProCurve 2510-24 manuals available for free PDF download: Access Security Manual, Installation And Getting Started Manual, Specification

HP ProCurve 2510-24 Access Security Manual

HP ProCurve 2510-24 Access Security Manual (294 pages)

ProCurve 2510 Series  
Brand: HP | Category: Switch | Size: 1.96 MB
Table of contents
Access Security Guide3................................................................................................................................................................
Table Of Contents5................................................................................................................................................................
Product Documentation13................................................................................................................................................................
About Your Switch Manual Set13................................................................................................................................................................
Feature Index14................................................................................................................................................................
Getting Started18................................................................................................................................................................
Introduction18................................................................................................................................................................
Overview Of Access Security Features18................................................................................................................................................................
Management Access Security Protection19................................................................................................................................................................
General Switch Traffic Security Guidelines20................................................................................................................................................................
Conventions21................................................................................................................................................................
Command Syntax Statements21................................................................................................................................................................
Command Prompts22................................................................................................................................................................
Screen Simulations22................................................................................................................................................................
Port Identity Examples22................................................................................................................................................................
Sources For More Information23................................................................................................................................................................
Need Only A Quick Start24................................................................................................................................................................
Ip Addressing24................................................................................................................................................................
To Set Up And Install The Switch In Your Network25................................................................................................................................................................
Contents27................................................................................................................................................................
Configuring Username And Password Security28................................................................................................................................................................
Overview28................................................................................................................................................................
Configuring Local Password Security30................................................................................................................................................................
Menu: Setting Passwords30................................................................................................................................................................
Cli: Setting Passwords And Usernames31................................................................................................................................................................
Web: Setting Passwords And Usernames32................................................................................................................................................................
Front-panel Security33................................................................................................................................................................
When Security Is Important33................................................................................................................................................................
Front-panel Button Functions34................................................................................................................................................................
Configuring Front-panel Security36................................................................................................................................................................
Password Recovery41................................................................................................................................................................
Password Recovery Process43................................................................................................................................................................
Web And Mac Authentication45................................................................................................................................................................
Client Options47................................................................................................................................................................
General Features48................................................................................................................................................................
How Web And Mac Authentication Operate49................................................................................................................................................................
Authenticator Operation49................................................................................................................................................................
Terminology53................................................................................................................................................................
Operating Rules And Notes54................................................................................................................................................................
General Setup Procedure For Web/mac Authentication56................................................................................................................................................................
Do These Steps Before You Configure Web/mac Authentication56................................................................................................................................................................
Additional Information For Configuring The Radius Server To Support Mac Authentication58................................................................................................................................................................
Configuring The Switch To Access A Radius Server59................................................................................................................................................................
Configuring Web Authentication61................................................................................................................................................................
Configure The Switch For Web-based Authentication62................................................................................................................................................................
Configuring Mac Authentication On The Switch66................................................................................................................................................................
Configure The Switch For Mac-based Authentication67................................................................................................................................................................
Show Status And Configuration Of Web-based Authentication70................................................................................................................................................................
Show Status And Configuration Of Mac-based Authentication72................................................................................................................................................................
Show Client Status74................................................................................................................................................................
Tacacs+ Authentication75................................................................................................................................................................
Terminology Used In Tacacs Applications77................................................................................................................................................................
General System Requirements79................................................................................................................................................................
General Authentication Setup Procedure79................................................................................................................................................................
Configuring Tacacs+ On The Switch82................................................................................................................................................................
Before You Begin82................................................................................................................................................................
Cli Commands Described In This Section83................................................................................................................................................................
Viewing The Switch's Current Authentication Configuration83................................................................................................................................................................
Viewing The Switch's Current Tacacs+ Server Contact Configuration84................................................................................................................................................................
Configuring The Switch's Authentication Methods85................................................................................................................................................................
Configuring The Switch's Tacacs+ Server Access89................................................................................................................................................................
How Authentication Operates94................................................................................................................................................................
General Authentication Process Using A Tacacs+ Server94................................................................................................................................................................
Local Authentication Process96................................................................................................................................................................
Using The Encryption Key97................................................................................................................................................................
Controlling Web Browser Interface Access When Using Tacacs+ Authentication98................................................................................................................................................................
Controlling Web Browser Interface Access When Using Tacacs98................................................................................................................................................................
Authentication98................................................................................................................................................................
Messages Related To Tacacs+ Operation99................................................................................................................................................................
Operating Notes99................................................................................................................................................................
Radius Authentication And Accounting101................................................................................................................................................................
Switch Operating Rules For Radius104................................................................................................................................................................
General Radius Setup Procedure105................................................................................................................................................................
Configuring The Switch For Radius Authentication106................................................................................................................................................................
Outline Of The Steps For Configuring Radius Authentication107................................................................................................................................................................
Configure Authentication For The Access Methods You Want Radius To Protect108................................................................................................................................................................
Configure The Switch To Access A Radius Server110................................................................................................................................................................
Configure The Switch's Global Radius Parameters112................................................................................................................................................................
Controlling Web Browser Interface Access When Using Radius Authentication117................................................................................................................................................................
Configuring Radius Accounting117................................................................................................................................................................
Operating Rules For Radius Accounting119................................................................................................................................................................
Steps For Configuring Radius Accounting119................................................................................................................................................................
Reports To The Radius Server122................................................................................................................................................................
Viewing Radius Statistics125................................................................................................................................................................
General Radius Statistics125................................................................................................................................................................
Radius Authentication Statistics128................................................................................................................................................................
Radius Accounting Statistics129................................................................................................................................................................
Changing Radius-server Access Order130................................................................................................................................................................
Messages Related To Radius Operation132................................................................................................................................................................
Configuring Secure Shell (ssh)133................................................................................................................................................................
Prerequisite For Using Ssh137................................................................................................................................................................
Public Key Formats137................................................................................................................................................................
Steps For Configuring And Using Ssh For Switch And Client Authentication138................................................................................................................................................................
General Operating Rules And Notes140................................................................................................................................................................
Configuring The Switch For Ssh Operation141................................................................................................................................................................
Assign Local Login (operator) And Enable (manager) Password141................................................................................................................................................................
Generate The Switch's Public And Private Key Pair142................................................................................................................................................................
Provide The Switch's Public Key To Clients144................................................................................................................................................................
Enable Ssh On The Switch And Anticipate Ssh Client Contact Behavior147................................................................................................................................................................
Configure The Switch For Ssh Authentication150................................................................................................................................................................
Use An Ssh Client To Access The Switch154................................................................................................................................................................
Further Information On Ssh Client Public-key Authentication155................................................................................................................................................................
Messages Related To Ssh Operation161................................................................................................................................................................
Configuring Secure Socket Layer (ssl)163................................................................................................................................................................
Prerequisite For Using Ssl167................................................................................................................................................................
Steps For Configuring And Using Ssl For Switch And Client Authentication167................................................................................................................................................................
Generate The Switch's Server Host Certificate170................................................................................................................................................................
Enable Ssl On The Switch And Anticipate Ssl Browser Contact Behavior179................................................................................................................................................................
Common Errors In Ssl Setup183................................................................................................................................................................
Configuring Port-based And Client-based Access Control (802.1x)185................................................................................................................................................................
Why Use Port-based Or Client-based Access Control187................................................................................................................................................................
User Authentication Methods188................................................................................................................................................................
General 802.1x Authenticator Operation194................................................................................................................................................................
Example Of The Authentication Process194................................................................................................................................................................
Switch-port Supplicant Operation195................................................................................................................................................................
General Setup Procedure For 802.1x Access Control198................................................................................................................................................................
Do These Steps Before You Configure 802.1x Operation198................................................................................................................................................................
Overview: Configuring 802.1x Authentication On The Switch199................................................................................................................................................................
Enable 802.1x Authentication On Selected Ports201................................................................................................................................................................
Configuring Switch Ports As 802.1x Authenticators201................................................................................................................................................................
Reconfigure Settings For Port-access204................................................................................................................................................................
Configure The 802.1x Authentication Method207................................................................................................................................................................
Enter The Radius Host Ip Address(es)208................................................................................................................................................................
Enable 802.1x Authentication On The Switch208................................................................................................................................................................
Optionally Resetting Authenticator Operation209................................................................................................................................................................
802.1x Open Vlan Mode210................................................................................................................................................................
Vlan Membership Priorities211................................................................................................................................................................
Use Models For 802.1x Open Vlan Modes212................................................................................................................................................................
Operating Rules For Authorized-client And Unauthorized-client Vlans215................................................................................................................................................................
Setting Up And Configuring 802.1x Open Vlan Mode218................................................................................................................................................................
802.1x Open Vlan Operating Notes222................................................................................................................................................................
Option For Authenticator Ports: Configure Port-security To Allow Only 802.1x Devices224................................................................................................................................................................
Option For Authenticator Ports: Configure Port-security To Allow224................................................................................................................................................................
Only 802.1x Devices224................................................................................................................................................................
Configuring Switch Ports To Operate As Supplicants For 802.1x Connections To Other Switches226................................................................................................................................................................
Displaying 802.1x Configuration, Statistics, And Counters231................................................................................................................................................................
Show Commands For Port-access Authenticator231................................................................................................................................................................
Viewing 802.1x Open Vlan Mode Status234................................................................................................................................................................
Show Commands For Port-access Supplicant237................................................................................................................................................................
How Radius/802.1x Authentication Affects Vlan Operation238................................................................................................................................................................
Messages Related To 802.1x Operation242................................................................................................................................................................
Configuring And Monitoring Port Security244................................................................................................................................................................
Basic Operation244................................................................................................................................................................
Blocking Unauthorized Traffic245................................................................................................................................................................
Trunk Group Exclusion246................................................................................................................................................................
Planning Port Security247................................................................................................................................................................
Port Security Command Options And Operation248................................................................................................................................................................
Retention Of Static Mac Addresses252................................................................................................................................................................
Displaying Current Port Security Settings252................................................................................................................................................................
Configuring Port Security254................................................................................................................................................................
Web: Displaying And Configuring Port Security Features259................................................................................................................................................................
Reading Intrusion Alerts And Resetting Alert Flags259................................................................................................................................................................
Notice Of Security Violations259................................................................................................................................................................
How The Intrusion Log Operates260................................................................................................................................................................
Keeping The Intrusion Log Current By Resetting Alert Flags261................................................................................................................................................................
Using The Event Log To Find Intrusion Alerts266................................................................................................................................................................
Web: Checking For Intrusions, Listing Intrusion Alerts, And Resetting Alert Flags267................................................................................................................................................................
Operating Notes For Port Security267................................................................................................................................................................
Configuring Protected Ports269................................................................................................................................................................
Configuring Multiple Stations Per Authorized Manager Ip Entry271................................................................................................................................................................
Additional Examples For Authorizing Multiple Stations271................................................................................................................................................................
Using Authorized Ip Managers272................................................................................................................................................................
Configuration Options273................................................................................................................................................................
Access Levels273................................................................................................................................................................
Defining Authorized Management Stations274................................................................................................................................................................
Overview Of Ip Mask Operation274................................................................................................................................................................
Menu: Viewing And Configuring Ip Authorized Managers275................................................................................................................................................................
Cli: Viewing And Configuring Authorized Ip Managers276................................................................................................................................................................
Configuring Ip Authorized Managers For The Switch277................................................................................................................................................................
Web: Configuring Ip Authorized Managers279................................................................................................................................................................
Building Ip Masks279................................................................................................................................................................
Configuring One Station Per Authorized Manager Ip Entry279................................................................................................................................................................

Advertisement

HP ProCurve 2510-24 Installation And Getting Started Manual

HP ProCurve 2510-24 Installation And Getting Started Manual (90 pages)

ProCurve Series  
Brand: HP | Category: Network Router | Size: 2.48 MB
Table of contents
Table Of Contents5................................................................................................................................................................
Introducing The Switch9................................................................................................................................................................
Front Of The Switch10................................................................................................................................................................
Network Ports10................................................................................................................................................................
Console Port10................................................................................................................................................................
Leds11................................................................................................................................................................
Led Mode Select Button And Indicator Leds12................................................................................................................................................................
Reset Button13................................................................................................................................................................
Clear Button13................................................................................................................................................................
Back Of The Switch14................................................................................................................................................................
Power Connector14................................................................................................................................................................
Switch Features15................................................................................................................................................................
Installing The Switch17................................................................................................................................................................
Included Parts17................................................................................................................................................................
Installation Procedures19................................................................................................................................................................
Summary19................................................................................................................................................................
Installation Precautions20................................................................................................................................................................
Prepare The Installation Site21................................................................................................................................................................
Installing Or Removing Mini-gbics23................................................................................................................................................................
Verify The Switch Passes Self Test25................................................................................................................................................................
Led Behavior26................................................................................................................................................................
Mount The Switch27................................................................................................................................................................
Rack Or Cabinet Mounting27................................................................................................................................................................
Rack Mounting The Switch 2510-2428................................................................................................................................................................
Horizontal Surface Mounting30................................................................................................................................................................
Wall Mounting31................................................................................................................................................................
Connect The Switch To A Power Source31................................................................................................................................................................
Connect The Network Cables32................................................................................................................................................................
Using The Rj-45 Connectors32................................................................................................................................................................
Connecting Cables To Mini-gbics32................................................................................................................................................................
Optional) Connect A Console To The Switch33................................................................................................................................................................
Terminal Configuration33................................................................................................................................................................
Direct Console Access34................................................................................................................................................................
Sample Network Topologies35................................................................................................................................................................
As A Desktop Switch35................................................................................................................................................................
As A Segment Switch36................................................................................................................................................................
Connecting To A Backbone Switch38................................................................................................................................................................
Stacking The Switch39................................................................................................................................................................
Configuring The Switch41................................................................................................................................................................
Recommended Minimal Configuration41................................................................................................................................................................
Using The Console Setup Screen42................................................................................................................................................................
Where To Go From Here44................................................................................................................................................................
Using The Ip Address For Remote Switch Management45................................................................................................................................................................
Starting A Telnet Session45................................................................................................................................................................
Starting A Web Browser Session45................................................................................................................................................................
Troubleshooting47................................................................................................................................................................
Basic Troubleshooting Tips47................................................................................................................................................................
Diagnosing With The Leds50................................................................................................................................................................
Proactive Networking54................................................................................................................................................................
Hardware Diagnostic Tests55................................................................................................................................................................
Testing The Switch By Resetting It55................................................................................................................................................................
Checking The Switch Leds55................................................................................................................................................................
Checking Console Messages55................................................................................................................................................................
Testing Twisted-pair Cabling56................................................................................................................................................................
Testing Switch-to-device Network Communications56................................................................................................................................................................
Testing End-to-end Network Communications56................................................................................................................................................................
Restoring The Factory Default Configuration57................................................................................................................................................................
Downloading New Switch Software58................................................................................................................................................................
Procurve Customer Support Services58................................................................................................................................................................
Before Calling Support58................................................................................................................................................................
A Switch Specifications59................................................................................................................................................................
Physical59................................................................................................................................................................
Electrical59................................................................................................................................................................
Environmental59................................................................................................................................................................
Connectors60................................................................................................................................................................
Safety60................................................................................................................................................................
Lasers60................................................................................................................................................................
B Switch Ports And Network Cables61................................................................................................................................................................
Switch Ports61................................................................................................................................................................
Twisted-pair Cables61................................................................................................................................................................
Mode Conditioning Patch Cord For Gigabit-lx63................................................................................................................................................................
Installing The Patch Cord64................................................................................................................................................................
Twisted-pair Cable/connector Pin-outs65................................................................................................................................................................
Straight-through Twisted-pair Cable For 10 Mbps Or 100 Mbps Network Connections66................................................................................................................................................................
Cable Diagram66................................................................................................................................................................
Pin Assignments66................................................................................................................................................................
Crossover Twisted-pair Cable For 10 Mbps Or 100 Mbps Network Connection67................................................................................................................................................................
C Safety And Emc Regulatory Statements69................................................................................................................................................................
Safety Information69................................................................................................................................................................
Informations Concernant La Sécurité70................................................................................................................................................................
Hinweise Zur Sicherheit71................................................................................................................................................................
Considerazioni Sulla Sicurezza72................................................................................................................................................................
Consideraciones Sobre Seguridad73................................................................................................................................................................
Safety Information (japan74................................................................................................................................................................
Safety Information (china75................................................................................................................................................................
Emc Regulatory Statements76................................................................................................................................................................
Canada76................................................................................................................................................................
Australia/new Zealand76................................................................................................................................................................
Japan76................................................................................................................................................................
Korea77................................................................................................................................................................
Taiwan77................................................................................................................................................................
European Community78................................................................................................................................................................
D Recycle Statements79................................................................................................................................................................
Waste Electrical And Electronic Equipment (weee) Statements79................................................................................................................................................................
HP ProCurve 2510-24 Specification

HP ProCurve 2510-24 Specification (31 pages)

2510 Switch Series  
Brand: HP | Category: Switch | Size: 0.51 MB

Advertisement

Share and save

Advertisement