HP Q.11.XX Manuals

Manuals and User Guides for HP Q.11.XX. We have 1 HP Q.11.XX manual available for free PDF download: Manual

HP Q.11.XX Manual

HP Q.11.XX Manual (318 pages)

ProCurve Switches  
Brand: HP | Category: Switch | Size: 1.44 MB
Table of contents
Table Of Contents5................................................................................................................................................................
Getting Started5................................................................................................................................................................
Configuring Username And Password Security5................................................................................................................................................................
Web And Mac Authentication6................................................................................................................................................................
Tacacs+ Authentication7................................................................................................................................................................
Configuring Secure Shell (ssh)8................................................................................................................................................................
Access Control (802.1x)9................................................................................................................................................................
Configuring And Monitoring Port Security11................................................................................................................................................................
Using Authorized Ip Managers12................................................................................................................................................................
Product Documentation13................................................................................................................................................................
Contents17................................................................................................................................................................
Introduction18................................................................................................................................................................
Overview Of Access Security Features18................................................................................................................................................................
Management Access Security Protection19................................................................................................................................................................
General Switch Traffic Security Guidelines20................................................................................................................................................................
Conventions21................................................................................................................................................................
Command Syntax Statements21................................................................................................................................................................
Command Prompts22................................................................................................................................................................
Screen Simulations22................................................................................................................................................................
Port Identity Examples22................................................................................................................................................................
Sources For More Information23................................................................................................................................................................
Need Only A Quick Start?24................................................................................................................................................................
Need Only A Quick Start24................................................................................................................................................................
Ip Addressing24................................................................................................................................................................
To Set Up And Install The Switch In Your Network25................................................................................................................................................................
Overview28................................................................................................................................................................
Configuring Local Password Security30................................................................................................................................................................
Menu: Setting Passwords30................................................................................................................................................................
Cli: Setting Passwords And Usernames31................................................................................................................................................................
Web: Setting Passwords And Usernames32................................................................................................................................................................
Front-panel Security33................................................................................................................................................................
When Security Is Important33................................................................................................................................................................
Front-panel Button Functions '34................................................................................................................................................................
Front-panel Button Functions34................................................................................................................................................................
Configuring Front-panel Security36................................................................................................................................................................
Password Recovery41................................................................................................................................................................
Password Recovery Process43................................................................................................................................................................
Client Options47................................................................................................................................................................
General Features48................................................................................................................................................................
How Web And Mac Authentication Operate49................................................................................................................................................................
Authenticator Operation49................................................................................................................................................................
Terminology53................................................................................................................................................................
Operating Rules And Notes54................................................................................................................................................................
General Setup Procedure For Web/mac Authentication56................................................................................................................................................................
Do These Steps Before You Configure Web/mac Authentication56................................................................................................................................................................
Server To Support Mac Authentication58................................................................................................................................................................
Configuring The Switch To Access A Radius Server59................................................................................................................................................................
Configuring Web Authentication61................................................................................................................................................................
Configure The Switch For Web-based Authentication62................................................................................................................................................................
Configuring Mac Authentication On The Switch66................................................................................................................................................................
Configure The Switch For Mac-based Authentication67................................................................................................................................................................
Show Status And Configuration Of Web-based Authentication70................................................................................................................................................................
Show Status And Configuration Of Mac-based Authentication72................................................................................................................................................................
Show Client Status74................................................................................................................................................................
Terminology Used In Tacacs+ Applications:77................................................................................................................................................................
Terminology Used In Tacacs+ Applications77................................................................................................................................................................
General System Requirements79................................................................................................................................................................
General Authentication Setup Procedure79................................................................................................................................................................
Configuring Tacacs+ On The Switch82................................................................................................................................................................
Before You Begin82................................................................................................................................................................
Cli Commands Described In This Section83................................................................................................................................................................
Viewing The Switch's Current Authentication Configuration83................................................................................................................................................................
Contact Configuration84................................................................................................................................................................
Configuring The Switch's Tacacs+ Authentication Methods85................................................................................................................................................................
Configuring The Switch's Tacacs+ Server Access92................................................................................................................................................................
How Authentication Operates97................................................................................................................................................................
General Authentication Process Using A Tacacs+ Server97................................................................................................................................................................
Local Authentication Process99................................................................................................................................................................
Using The Encryption Key100................................................................................................................................................................
Authentication101................................................................................................................................................................
Controlling Web Browser Interface Access When Using Tacacs101................................................................................................................................................................
Messages Related To Tacacs+ Operation102................................................................................................................................................................
Switch Operating Rules For Radius108................................................................................................................................................................
General Radius Setup Procedure109................................................................................................................................................................
Configuring The Switch For Radius Authentication110................................................................................................................................................................
Outline Of The Steps For Configuring Radius Authentication111................................................................................................................................................................
You Want Radius To Protect112................................................................................................................................................................
Configure Authentication For The Access Methods112................................................................................................................................................................
Configure The Switch To Access A Radius Server114................................................................................................................................................................
Configure The Switch's Global Radius Parameters116................................................................................................................................................................
Commands Authorization121................................................................................................................................................................
Enabling Authorization122................................................................................................................................................................
Displaying Authorization Information123................................................................................................................................................................
Configuring Commands Authorization On A Radius Server123................................................................................................................................................................
Example Configuration On Cisco Secure Acs For Ms Windows125................................................................................................................................................................
Example Configuration Using Freeradius128................................................................................................................................................................
Configuring Radius Accounting129................................................................................................................................................................
Operating Rules For Radius Accounting130................................................................................................................................................................
Steps For Configuring Radius Accounting131................................................................................................................................................................
Reports To The Radius Server133................................................................................................................................................................
Updating Options135................................................................................................................................................................
Viewing Radius Statistics136................................................................................................................................................................
General Radius Statistics136................................................................................................................................................................
Radius Authentication Statistics139................................................................................................................................................................
Radius Accounting Statistics140................................................................................................................................................................
Changing Radius-server Access Order141................................................................................................................................................................
Messages Related To Radius Operation143................................................................................................................................................................
Prerequisite For Using Ssh149................................................................................................................................................................
Public Key Formats149................................................................................................................................................................
General Operating Rules And Notes152................................................................................................................................................................
Configuring The Switch For Ssh Operation153................................................................................................................................................................
Generate The Switch's Public And Private Key Pair154................................................................................................................................................................
Provide The Switch's Public Key To Clients156................................................................................................................................................................
Client Contact Behavior159................................................................................................................................................................
Enable Ssh On The Switch And Anticipate Ssh159................................................................................................................................................................
Configure The Switch For Ssh Authentication162................................................................................................................................................................
Use An Ssh Client To Access The Switch166................................................................................................................................................................
Further Information On Ssh Client Public-key Authentication166................................................................................................................................................................
Messages Related To Ssh Operation172................................................................................................................................................................
Prerequisite For Using Ssl179................................................................................................................................................................
Assign Local Login (operator) And Enable (manager) Password181................................................................................................................................................................
Generate The Switch's Server Host Certificate182................................................................................................................................................................
Browser Contact Behavior191................................................................................................................................................................
Enable Ssl On The Switch And Anticipate Ssl191................................................................................................................................................................
Common Errors In Ssl Setup195................................................................................................................................................................
Why Use Port-based Or Client-based Access Control199................................................................................................................................................................
User Authentication Methods200................................................................................................................................................................
Example Of The Authentication Process206................................................................................................................................................................
General 802.1x Authenticator Operation206................................................................................................................................................................
Switch-port Supplicant Operation207................................................................................................................................................................
General Setup Procedure For 802.1x Access Control210................................................................................................................................................................
Do These Steps Before You Configure 802.1x Operation210................................................................................................................................................................
Overview: Configuring 802.1x Authentication On The Switch211................................................................................................................................................................
Configuring Switch Ports As 802.1x Authenticators213................................................................................................................................................................
Enable 802.1x Authentication On Selected Ports213................................................................................................................................................................
Reconfigure Settings For Port-access216................................................................................................................................................................
Configure The 802.1x Authentication Method219................................................................................................................................................................
Enter The Radius Host Ip Address(es)220................................................................................................................................................................
Enable 802.1x Authentication On The Switch220................................................................................................................................................................
Optionally Resetting Authenticator Operation221................................................................................................................................................................
X Open Vlan Mode222................................................................................................................................................................
Vlan Membership Priorities223................................................................................................................................................................
Use Models For 802.1x Open Vlan Modes224................................................................................................................................................................
Setting Up And Configuring 802.1x Open Vlan Mode230................................................................................................................................................................
X Open Vlan Operating Notes234................................................................................................................................................................
Option For Authenticator Ports: Configure Port-security To Allow236................................................................................................................................................................
Only 802.1x Devices236................................................................................................................................................................
Displaying 802.1x Configuration, Statistics, And Counters243................................................................................................................................................................
Show Commands For Port-access Authenticator243................................................................................................................................................................
Viewing 802.1x Open Vlan Mode Status246................................................................................................................................................................
Show Commands For Port-access Supplicant249................................................................................................................................................................
How Radius/802.1x Authentication Affects Vlan Operation250................................................................................................................................................................
Messages Related To 802.1x Operation254................................................................................................................................................................
Basic Operation256................................................................................................................................................................
Blocking Unauthorized Traffic257................................................................................................................................................................
Trunk Group Exclusion258................................................................................................................................................................
Planning Port Security259................................................................................................................................................................
Port Security Command Options And Operation260................................................................................................................................................................
Retention Of Static Mac Addresses264................................................................................................................................................................
Displaying Current Port Security Settings264................................................................................................................................................................
Configuring Port Security266................................................................................................................................................................
Mac Lockdown272................................................................................................................................................................
Differences Between Mac Lockdown And Port Security273................................................................................................................................................................
Deploying Mac Lockdown275................................................................................................................................................................
Mac Lockout279................................................................................................................................................................
Port Security And Mac Lockout281................................................................................................................................................................
Reading Intrusion Alerts And Resetting Alert Flags282................................................................................................................................................................
Notice Of Security Violations282................................................................................................................................................................
Web: Displaying And Configuring Port Security Features282................................................................................................................................................................
How The Intrusion Log Operates283................................................................................................................................................................
Keeping The Intrusion Log Current By Resetting Alert Flags284................................................................................................................................................................
Using The Event Log To Find Intrusion Alerts289................................................................................................................................................................
Operating Notes For Port Security290................................................................................................................................................................
Configuring Protected Ports292................................................................................................................................................................
Configuration Options297................................................................................................................................................................
Access Levels297................................................................................................................................................................
Defining Authorized Management Stations298................................................................................................................................................................
Overview Of Ip Mask Operation298................................................................................................................................................................
Menu: Viewing And Configuring Ip Authorized Managers299................................................................................................................................................................
Cli: Viewing And Configuring Authorized Ip Managers300................................................................................................................................................................
Configuring Ip Authorized Managers For The Switch301................................................................................................................................................................
Building Ip Masks303................................................................................................................................................................
Configuring One Station Per Authorized Manager Ip Entry303................................................................................................................................................................
Web: Configuring Ip Authorized Managers303................................................................................................................................................................
Configuring Multiple Stations Per Authorized Manager Ip Entry304................................................................................................................................................................
Additional Examples For Authorizing Multiple Stations306................................................................................................................................................................

Advertising

Share and save

Advertising