HP ProCurve 2848 Manuals

Manuals and User Guides for HP ProCurve 2848. We have 3 HP ProCurve 2848 manuals available for free PDF download: Function Manual, Install Manual, Datasheet

HP ProCurve 2848 Function Manual

HP ProCurve 2848 Function Manual (306 pages)

Access Security Guide ProCurve 2600, 2600-PWR, 2800, 4100, 6108 Series  
Brand: HP | Category: Switch | Size: 2.18 MB
Table of contents
Access Security Guide1................................................................................................................................................................
Table Of Contents5................................................................................................................................................................
Getting Started5................................................................................................................................................................
Configuring Username And Password Security5................................................................................................................................................................
Web And Mac Authentication For The Series6................................................................................................................................................................
Pwr And 2800 Switches6................................................................................................................................................................
Tacacs+ Authentication7................................................................................................................................................................
Radius Authentication And Accounting7................................................................................................................................................................
Configuring Secure Shell (ssh)8................................................................................................................................................................
Configuring And Monitoring Port Security10................................................................................................................................................................
Product Documentation13................................................................................................................................................................
Contents17................................................................................................................................................................
Introduction18................................................................................................................................................................
Overview Of Access Security Features18................................................................................................................................................................
Management Access Security Protection19................................................................................................................................................................
General Switch Traffic Security Guidelines20................................................................................................................................................................
Conventions21................................................................................................................................................................
Feature Descriptions By Model21................................................................................................................................................................
Command Syntax Statements21................................................................................................................................................................
Command Prompts22................................................................................................................................................................
Screen Simulations22................................................................................................................................................................
Port Identity Examples22................................................................................................................................................................
Sources For More Information23................................................................................................................................................................
Need Only A Quick Start?24................................................................................................................................................................
Ip Addressing24................................................................................................................................................................
Need Only A Quick Start24................................................................................................................................................................
To Set Up And Install The Switch In Your Network25................................................................................................................................................................
Overview28................................................................................................................................................................
Configuring Local Password Security30................................................................................................................................................................
Menu: Setting Passwords30................................................................................................................................................................
Cli: Setting Passwords And Usernames31................................................................................................................................................................
Web: Setting Passwords And Usernames32................................................................................................................................................................
Front-panel Security33................................................................................................................................................................
When Security Is Important33................................................................................................................................................................
Front-panel Button Functions34................................................................................................................................................................
Configuring Front-panel Security36................................................................................................................................................................
Password Recovery41................................................................................................................................................................
Password Recovery Process43................................................................................................................................................................
Client Options47................................................................................................................................................................
General Features48................................................................................................................................................................
How Web And Mac Authentication Operate49................................................................................................................................................................
Authenticator Operation49................................................................................................................................................................
Terminology53................................................................................................................................................................
Operating Rules And Notes54................................................................................................................................................................
General Setup Procedure For Web/mac Authentication56................................................................................................................................................................
Do These Steps Before You Configure Web/mac Authentication56................................................................................................................................................................
Mac Authentication58................................................................................................................................................................
Configuring The Switch To Access A Radius Server59................................................................................................................................................................
Configuring Web Authentication61................................................................................................................................................................
Configure The Switch For Web-based Authentication62................................................................................................................................................................
Configuring Mac Authentication On The Switch66................................................................................................................................................................
Configure The Switch For Mac-based Authentication67................................................................................................................................................................
Show Status And Configuration Of Web-based Authentication70................................................................................................................................................................
Show Status And Configuration Of Mac-based Authentication71................................................................................................................................................................
Show Client Status73................................................................................................................................................................
Terminology Used In Tacacs Applications:77................................................................................................................................................................
Terminology Used In Tacacs Applications77................................................................................................................................................................
General System Requirements79................................................................................................................................................................
General Authentication Setup Procedure79................................................................................................................................................................
Configuring Tacacs+ On The Switch82................................................................................................................................................................
Before You Begin82................................................................................................................................................................
Cli Commands Described In This Section83................................................................................................................................................................
Viewing The Switch's Current Authentication Configuration83................................................................................................................................................................
Configuring The Switch's Authentication Methods85................................................................................................................................................................
Configuring The Switch's Tacacs+ Server Access89................................................................................................................................................................
How Authentication Operates94................................................................................................................................................................
General Authentication Process Using A Tacacs+ Server94................................................................................................................................................................
Local Authentication Process96................................................................................................................................................................
Using The Encryption Key97................................................................................................................................................................
Authentication98................................................................................................................................................................
Controlling Web Browser Interface Access When Using Tacacs98................................................................................................................................................................
Messages Related To Tacacs+ Operation99................................................................................................................................................................
Operating Notes99................................................................................................................................................................
Switch Operating Rules For Radius104................................................................................................................................................................
General Radius Setup Procedure105................................................................................................................................................................
Configuring The Switch For Radius Authentication106................................................................................................................................................................
Outline Of The Steps For Configuring Radius Authentication107................................................................................................................................................................
To Protect108................................................................................................................................................................
Configure The Switch To Access A Radius Server110................................................................................................................................................................
Configure The Switch's Global Radius Parameters112................................................................................................................................................................
Configuring Radius Accounting117................................................................................................................................................................
Operating Rules For Radius Accounting119................................................................................................................................................................
Steps For Configuring Radius Accounting119................................................................................................................................................................
Reports To The Radius Server122................................................................................................................................................................
Viewing Radius Statistics125................................................................................................................................................................
General Radius Statistics125................................................................................................................................................................
Radius Authentication Statistics127................................................................................................................................................................
Radius Accounting Statistics128................................................................................................................................................................
Changing Radius-server Access Order129................................................................................................................................................................
Messages Related To Radius Operation131................................................................................................................................................................
Prerequisite For Using Ssh137................................................................................................................................................................
Public Key Formats137................................................................................................................................................................
General Operating Rules And Notes140................................................................................................................................................................
Configuring The Switch For Ssh Operation141................................................................................................................................................................
Assign Local Login (operator) And Enable (manager) Password141................................................................................................................................................................
Generate The Switch's Public And Private Key Pair142................................................................................................................................................................
Provide The Switch's Public Key To Clients144................................................................................................................................................................
Contact Behavior147................................................................................................................................................................
Enable Ssh On The Switch And Anticipate Ssh Client147................................................................................................................................................................
Configure The Switch For Ssh Authentication150................................................................................................................................................................
Use An Ssh Client To Access The Switch153................................................................................................................................................................
Further Information On Ssh Client Public-key Authentication153................................................................................................................................................................
Messages Related To Ssh Operation159................................................................................................................................................................
Prerequisite For Using Ssl165................................................................................................................................................................
Configuring The Switch For Ssl Operation167................................................................................................................................................................
Generate The Switch's Server Host Certificate169................................................................................................................................................................
Comments On Certificate Fields171................................................................................................................................................................
Behavior177................................................................................................................................................................
Common Errors In Ssl Setup181................................................................................................................................................................
Why Use Port-based Access Control?185................................................................................................................................................................
Why Use Port-based Access Control185................................................................................................................................................................
How 802.1x Operates188................................................................................................................................................................
Switch-port Supplicant Operation189................................................................................................................................................................
General Setup Procedure For Port-based Access Control (802.1x)194................................................................................................................................................................
Do These Steps Before You Configure 802.1x Operation194................................................................................................................................................................
Overview: Configuring 802.1x Authentication On The Switch195................................................................................................................................................................
Configuring Switch Ports As 802.1x Authenticators197................................................................................................................................................................
Enable 802.1x Authentication On Selected Ports197................................................................................................................................................................
Configure The 802.1x Authentication Method201................................................................................................................................................................
Enter The Radius Host Ip Address(es)202................................................................................................................................................................
Enable 802.1x Authentication On The Switch202................................................................................................................................................................
X Open Vlan Mode203................................................................................................................................................................
Use Models For 802.1x Open Vlan Modes204................................................................................................................................................................
Setting Up And Configuring 802.1x Open Vlan Mode209................................................................................................................................................................
X Open Vlan Operating Notes213................................................................................................................................................................
X Devices214................................................................................................................................................................
To Other Switches216................................................................................................................................................................
Displaying 802.1x Configuration, Statistics, And Counters220................................................................................................................................................................
Show Commands For Port-access Authenticator220................................................................................................................................................................
Viewing 802.1x Open Vlan Mode Status222................................................................................................................................................................
Show Commands For Port-access Supplicant225................................................................................................................................................................
How Radius/802.1x Authentication Affects Vlan Operation226................................................................................................................................................................
Messages Related To 802.1x Operation230................................................................................................................................................................
Basic Operation232................................................................................................................................................................
Blocking Unauthorized Traffic233................................................................................................................................................................
Trunk Group Exclusion234................................................................................................................................................................
Planning Port Security235................................................................................................................................................................
Port Security Command Options And Operation236................................................................................................................................................................
Retention Of Static Mac Addresses240................................................................................................................................................................
Displaying Current Port Security Settings240................................................................................................................................................................
Configuring Port Security242................................................................................................................................................................
Mac Lockdown247................................................................................................................................................................
Differences Between Mac Lockdown And Port Security249................................................................................................................................................................
Deploying Mac Lockdown251................................................................................................................................................................
Mac Lockout255................................................................................................................................................................
Port Security And Mac Lockout257................................................................................................................................................................
Ip Lockdown258................................................................................................................................................................
Web: Displaying And Configuring Port Security Features259................................................................................................................................................................
Reading Intrusion Alerts And Resetting Alert Flags259................................................................................................................................................................
Notice Of Security Violations259................................................................................................................................................................
How The Intrusion Log Operates260................................................................................................................................................................
Keeping The Intrusion Log Current By Resetting Alert Flags261................................................................................................................................................................
Using The Event Log To Find Intrusion Alerts266................................................................................................................................................................
Alert Flags266................................................................................................................................................................
Operating Notes For Port Security267................................................................................................................................................................
Using Source-port Filters272................................................................................................................................................................
Operating Rules For Source-port Filters272................................................................................................................................................................
Configuring A Source-port Filter273................................................................................................................................................................
Viewing A Source-port Filter275................................................................................................................................................................
Filter Indexing276................................................................................................................................................................
Editing A Source-port Filter277................................................................................................................................................................
Using Named Source-port Filters278................................................................................................................................................................
Configuration Options289................................................................................................................................................................
Access Levels289................................................................................................................................................................
Defining Authorized Management Stations290................................................................................................................................................................
Overview Of Ip Mask Operation290................................................................................................................................................................
Menu: Viewing And Configuring Ip Authorized Managers291................................................................................................................................................................
Cli: Viewing And Configuring Authorized Ip Managers292................................................................................................................................................................
Configuring Ip Authorized Managers For The Switch293................................................................................................................................................................
Web: Configuring Ip Authorized Managers295................................................................................................................................................................
Building Ip Masks295................................................................................................................................................................
Configuring One Station Per Authorized Manager Ip Entry295................................................................................................................................................................
Configuring Multiple Stations Per Authorized Manager Ip Entry296................................................................................................................................................................
Additional Examples For Authorizing Multiple Stations297................................................................................................................................................................

Advertising

HP ProCurve 2848 Install Manual

HP ProCurve 2848 Install Manual (92 pages)

HP ProCurve 2824: Install Guide  
Brand: HP | Category: Switch | Size: 2.32 MB
Table of contents
Table Of Contents5................................................................................................................................................................
Introducing The Switch9................................................................................................................................................................
Front Of The Switch11................................................................................................................................................................
Network Ports11................................................................................................................................................................
Leds13................................................................................................................................................................
Led Mode Select Button And Indicator Leds15................................................................................................................................................................
Reset Button16................................................................................................................................................................
Clear Button16................................................................................................................................................................
Back Of The Switch17................................................................................................................................................................
Console Port17................................................................................................................................................................
Power Connector17................................................................................................................................................................
Switch Features18................................................................................................................................................................
Included Parts19................................................................................................................................................................
Installation Procedures21................................................................................................................................................................
Summary21................................................................................................................................................................
Installation Precautions:22................................................................................................................................................................
Prepare The Installation Site23................................................................................................................................................................
Installing Or Removing Mini-gbics25................................................................................................................................................................
Verify The Switch Passes Self Test27................................................................................................................................................................
Led Behavior:28................................................................................................................................................................
Mount The Switch29................................................................................................................................................................
Rack Or Cabinet Mounting29................................................................................................................................................................
Rack Mounting The Switch 284830................................................................................................................................................................
Rack Mounting The Switch 282432................................................................................................................................................................
Horizontal Surface Mounting35................................................................................................................................................................
Connect The Switch To A Power Source35................................................................................................................................................................
Connect The Network Cables36................................................................................................................................................................
Using The Rj-45 Connectors36................................................................................................................................................................
Connecting Cables To Mini-gbics36................................................................................................................................................................
Switch37................................................................................................................................................................
Optional) Connect A Console To The Switch40................................................................................................................................................................
Terminal Configuration40................................................................................................................................................................
Direct Console Access41................................................................................................................................................................
Sample Network Topologies42................................................................................................................................................................
As A Desktop Switch42................................................................................................................................................................
As A Segment Switch43................................................................................................................................................................
Connecting To A Backbone Switch45................................................................................................................................................................
Stacking The Switch46................................................................................................................................................................
The Switch In A Redundant Topology47................................................................................................................................................................
Recommended Minimal Configuration49................................................................................................................................................................
Using The Console Setup Screen50................................................................................................................................................................
Where To Go From Here52................................................................................................................................................................
Using The Ip Address For Remote Switch Management53................................................................................................................................................................
Starting A Telnet Session53................................................................................................................................................................
Starting A Web Browser Session53................................................................................................................................................................
Basic Troubleshooting Tips55................................................................................................................................................................
Diagnosing With The Leds58................................................................................................................................................................
Diagnostic Tips59................................................................................................................................................................
Proactive Networking62................................................................................................................................................................
Hardware Diagnostic Tests63................................................................................................................................................................
Testing The Switch By Resetting It63................................................................................................................................................................
Checking The Switch Leds63................................................................................................................................................................
Checking Console Messages63................................................................................................................................................................
Testing Twisted-pair Cabling64................................................................................................................................................................
Testing Switch-to-device Network Communications64................................................................................................................................................................
Testing End-to-end Network Communications64................................................................................................................................................................
Restoring The Factory Default Configuration65................................................................................................................................................................
Before Calling Support66................................................................................................................................................................
Downloading New Switch Software66................................................................................................................................................................
Hp Customer Support Services66................................................................................................................................................................
Physical67................................................................................................................................................................
Electrical67................................................................................................................................................................
Environmental67................................................................................................................................................................
Acoustic68................................................................................................................................................................
Switch Ports69................................................................................................................................................................
Twisted-pair Cables69................................................................................................................................................................
Connectors70................................................................................................................................................................
Mode Conditioning Patch Cord For Gigabit-lx71................................................................................................................................................................
Installing The Patch Cord72................................................................................................................................................................
Recommended Patch Cords72................................................................................................................................................................
Twisted-pair Cable/connector Pin-outs73................................................................................................................................................................
Mbps Or 100 Mbps Network Connections74................................................................................................................................................................
Cable Diagram74................................................................................................................................................................
Pin Assignments74................................................................................................................................................................
Mbps Or 100 Mbps Network Connection75................................................................................................................................................................
Mbps Network Connections76................................................................................................................................................................
Safety77................................................................................................................................................................
Safety Information77................................................................................................................................................................
Informations Concernant La Sécurité78................................................................................................................................................................
Hinweise Zur Sicherheit79................................................................................................................................................................
Considerazioni Sulla Sicurezza80................................................................................................................................................................
Consideraciones Sobre Seguridad81................................................................................................................................................................
Safety Information (japan)82................................................................................................................................................................
Safety Information (china)83................................................................................................................................................................
Emc Regulatory Statements84................................................................................................................................................................
U.s.a84................................................................................................................................................................
Canada84................................................................................................................................................................
Australia/new Zealand84................................................................................................................................................................
Japan84................................................................................................................................................................
Korea85................................................................................................................................................................
Taiwan85................................................................................................................................................................
European Community86................................................................................................................................................................
HP ProCurve 2848 Datasheet

HP ProCurve 2848 Datasheet (6 pages)

HP ProCurve 2824: Specifications  
Brand: HP | Category: Switch | Size: 0.77 MB
Table of contents
Features And Benefits2................................................................................................................................................................
Layer 3 Routing2................................................................................................................................................................
Resiliency And High Availability2................................................................................................................................................................
Layer 2 Switching2................................................................................................................................................................
Warranty And Support3................................................................................................................................................................
Specifications4................................................................................................................................................................
For More Information6................................................................................................................................................................

Advertising

Share and save

Advertising