Hp 2800 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Tiskárny Hp 2800. HP 2800 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 300
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1

Access Security Guidewww.hp.com/go/hpprocurveSwitch 2600 SeriesSwitch 2600-PWR SeriesSwitch 2800 SeriesSwitch 4100 SeriesSwitch 6108

Strany 2

5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . . 8-20 802.1X Open VLAN Mode . . . . . . . . . . . . . . . . . . . .

Strany 3 - October 2004

TACACS+ Authentication Operating Notes  When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ servers are not acces

Strany 4

5 RADIUS Authentication and Accounting Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 5

RADIUS Authentication and Accounting Overview Overview Feature Default Menu CLI Web Configuring RADIUS Authentication None n/a 5-6 n/a Configu

Strany 6 - 4 TACACS+ Authentication

RADIUS Authentication and Accounting Terminology Terminology CHAP (Challenge-Handshake Authentication Protocol): A challenge-response authentication p

Strany 7

RADIUS Authentication and Accounting Switch Operating Rules for RADIUS Switch Operating Rules for RADIUS  You must have at least one RADIUS server a

Strany 8

RADIUS Authentication and Accounting General RADIUS Setup Procedure General RADIUS Setup Procedure Preparation: 1. Configure one to three RADIUS serv

Strany 9

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Configuring the Switch for RADIUS Authentication RADIUS Authenti

Strany 10

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Note- This step assumes you have already configured the RADIUS s

Strany 11 - 10 Traffic/Security Filters

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 1. Configure Authentication for the Access Methods You Want RADI

Strany 12

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose you have already configured local passwords

Strany 13 - Getting Started

MAC Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-25 Port Security and MAC Lockout . .

Strany 14

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 2. Configure the Switch To Access a RADIUS Server This section d

Strany 15

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose you have configured the switch as shown in

Strany 16

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 3. Configure the Switch’s Global RADIUS Parameters You can confi

Strany 17 - Guideline

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Syntax: aaa authentication num-attempts < 1 - 10 > Specif

Strany 18 - Simulating Display Output

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose that your switch is configured to use three

Strany 19 - Related Publications

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication After two attempts failing due to username or password entry err

Strany 20

RADIUS Authentication and Accounting Local Authentication Process Local Authentication Process When the switch is configured to use RADIUS, it reverts

Strany 21 - 3. Click on manuals

RADIUS Authentication and Accounting Controlling Web Browser Interface Access When Using RADIUS Authentication Controlling Web Browser Interface Acces

Strany 22 - Sources for More Information

RADIUS Authentication and Accounting Configuring RADIUS Accounting Note This section assumes you have already:  Configured RADIUS authentication on

Strany 23 - Network

RADIUS Authentication and Accounting Configuring RADIUS Accounting The switch forwards the accounting information it collects to the designated RADIUS

Strany 24

Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9 Configuring One Station Per Authori

Strany 25

RADIUS Authentication and Accounting Configuring RADIUS Accounting – Optional—if you are also configuring the switch for RADIUS authentication, and n

Strany 26

RADIUS Authentication and Accounting Configuring RADIUS Accounting Syntax: [no] radius-server host < ip-address > Adds a server to the RADIUS c

Strany 27

RADIUS Authentication and Accounting Configuring RADIUS Accounting Because the radius-server command includes an acct-port element with a non-default

Strany 28 - Menu: Setting Passwords

RADIUS Authentication and Accounting Configuring RADIUS Accounting  Start-Stop: • Send a start record accounting notice at the beginning of the acc

Strany 29

RADIUS Authentication and Accounting Configuring RADIUS Accounting 3. (Optional) Configure Session Blocking and Interim Updating Options These optiona

Strany 30

RADIUS Authentication and Accounting Viewing RADIUS Statistics Viewing RADIUS Statistics General RADIUS Statistics Syntax: show radius [host < ip-

Strany 31 - Front-Panel Security

RADIUS Authentication and Accounting Viewing RADIUS Statistics Table 5-2. Values for Show Radius Host Output (Figure 5-11) Term Definition Round Tri

Strany 32

RADIUS Authentication and Accounting Viewing RADIUS Statistics RADIUS Authentication Statistics Syntax: show authentication Displays the primary and

Strany 33 - Front-Panel Button Functions

RADIUS Authentication and Accounting Viewing RADIUS Statistics RADIUS Accounting Statistics Syntax: show accounting Lists configured accounting inter

Strany 34 - Reset Button

RADIUS Authentication and Accounting Changing RADIUS-Server Access Order Figure 5-16. Example Listing of Active RADIUS Accounting Sessions on the Swit

Strany 35

1 Getting Started Contents Introduction and Applicable Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 About the Feature Desc

Strany 36

RADIUS Authentication and Accounting Changing RADIUS-Server Access Order To exchange the positions of the addresses so that the server at 10.10.10.003

Strany 37

RADIUS Authentication and Accounting Messages Related to RADIUS Operation Messages Related to RADIUS Operation Message Meaning Can’t reach RADIUS ser

Strany 38

RADIUS Authentication and Accounting Messages Related to RADIUS Operation — This page is intentionally unused. — 5-32

Strany 39

6 Configuring Secure Shell (SSH) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 40

Configuring Secure Shell (SSH) Overview Overview Feature Default Menu CLI Web Generating a public/private key pair on the switch No n/a page 6-

Strany 41 - Password Recovery

Configuring Secure Shell (SSH) Overview Note SSH in the HP Procurve is based on the OpenSSH software toolkit. For more information on OpenSSH, visit

Strany 42 - [N] (for “No”)

Configuring Secure Shell (SSH) Terminology Terminology  SSH Server: An HP ProCurve switch with SSH enabled.  Key Pair: A pair of keys generated by

Strany 43 - Password Recovery Process

Configuring Secure Shell (SSH) Prerequisite for Using SSH Prerequisite for Using SSH Before using the switch as an SSH server, you must install a publ

Strany 44

Configuring Secure Shell (SSH) Steps for Configuring and Using SSH for Switch and Client Authentication Steps for Configuring and Using SSH for Switch

Strany 45

Configuring Secure Shell (SSH) Steps for Configuring and Using SSH for Switch and Client Authentication B. Switch Preparation 1. Assign a login (Oper

Strany 46

Getting Started Introduction and Applicable Switches Introduction and Applicable Switches This guide describes how to use HP’s switch security feature

Strany 47 - Client Options

Configuring Secure Shell (SSH) General Operating Rules and Notes General Operating Rules and Notes  Public keys generated on an SSH client must be e

Strany 48 - General Features

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Configuring the Switch for SSH Operation SSH-Related Commands in This Section

Strany 49 - Operate

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Figure 6-5. Example of Configuring Local Passwords 2. Generating the Switch’s

Strany 50

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Notes When you generate a host key pair on the switch, the switch places the

Strany 51 - MAC-based Authentication

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation For example, to generate and display a new key: Host Public Key for the Switch

Strany 52

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation distribution to clients is to use a direct, serial connection between the swit

Strany 53

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation 4. Add any data required by your SSH client application. For example Before s

Strany 54 - Operating Rules and Notes

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Hexadecimal "Fingerprints" of the Same Switch Phonetic "Hash&qu

Strany 55

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation SSH Client Contact Behavior. At the first contact between the switch and an S

Strany 56

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation [port < 1-65535 | default >] The TCP port number for SSH connections (de

Strany 57

Getting Started Overview of Access Security Features Overview of Access Security Features  Local Manager and Operator Passwords (page 2-1): Control

Strany 58 - Addresses

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Caution Protect your private key file from access by anyone other than yourse

Strany 59 - RADIUS Server

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Syntax: aaa authentication ssh login < local | tacacs | radius >[< l

Strany 60

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Caution To allow SSH access only to clients having the correct public key, yo

Strany 61

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Figure 6-13 shows how to check the results of the above com

Strany 62

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication When configured for SSH operation, the switch automatically

Strany 63

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication a. Combines the decrypted byte sequence with specific sess

Strany 64

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication 1. Use your SSH client application to create a public/priv

Strany 65

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Syntax: copy tftp pub-key-file <ip-address> <file

Strany 66

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Enabling Client Public-Key Authentication. After you TFTP

Strany 67

Configuring Secure Shell (SSH) Messages Related to SSH Operation Messages Related to SSH Operation Message Meaning 00000K Peer unreachable. Indicates

Strany 68

Getting Started Overview of Access Security Features Table 1-1. Management Access Security Protection Security Feature Offers Protection Against Una

Strany 69

Configuring Secure Shell (SSH) Messages Related to SSH Operation Message Meaning Generating new RSA host key. If the cache is depleted, this could

Strany 70 - Based Authentication

7 Configuring Secure Socket Layer (SSL) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 71

Configuring Secure Socket Layer (SSL) Overview Overview Feature Default Menu CLI Web Generating a Self Signed Certificate on the switch No n/a

Strany 72

Configuring Secure Socket Layer (SSL) Terminology HP Switch (SSL Server) SSL Client Browser 1. Switch-to-Client SSL Cert. 2. User-to-Switch (login pas

Strany 73

Configuring Secure Socket Layer (SSL) Terminology  Self-Signed Certificate: A certificate not verified by a third-party certificate authority (CA).

Strany 74 - Client Status

Configuring Secure Socket Layer (SSL) Prerequisite for Using SSL Prerequisite for Using SSL Before using the switch as an SSL server, you must install

Strany 75

Configuring Secure Socket Layer (SSL) General Operating Rules and Notes General Operating Rules and Notes  Once you generate a certificate on the sw

Strany 76

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Configuring the Switch for SSL Operation SSL-Related CLI Commands in Th

Strany 77 - Applications:

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Using the web browser interface To Configure Local Passwords. You can

Strany 78

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation 2. Generating the Switch’s Server Host Certificate You must generate a

Strany 79 - General System Requirements

Getting Started General Switch Traffic Security Guideline General Switch Traffic Security Guideline Where the switch is running multiple security opti

Strany 80

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation To Generate or Erase the Switch’s Server Certificate with the CLI Becau

Strany 81 - Caution

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Comments on Certificate Fields. There are a number arguments used in th

Strany 82 - BeforeYou Begin

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Notes “Zeroizing” the switch’s server host certificate or key automati

Strany 83 - Configuration

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Generate a Self-Signed Host Certificate with the Web browser interface

Strany 84

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation For example, to generate a new host certificate via the web browsers in

Strany 85

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Current SSL Host Certificate Figure 7-6. Web browser Interface showing

Strany 86

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation The installation of a CA-signed certificate involves interaction with o

Strany 87 - Login Primary

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Certificate Request Certificate Request Reply -----BEGIN CERTIFICATE---

Strany 88

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Note Before enabling SSL on the switch you must generate the switch’s

Strany 89

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Using the CLI interface to enable SSL Syntax: [no] web-management ssl

Strany 90 - Encryption Keys

Getting Started Command Syntax Conventions Command Syntax Conventions This guide uses the following conventions for command syntax and displays. Synta

Strany 91

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Enable SLL and port number Selection Figure 7-8. Using the web browser

Strany 92 - First-Choice TACACS+ Server

Configuring Secure Socket Layer (SSL) Common Errors in SSL setup Common Errors in SSL setup Error During Possible Cause Generating host certificate o

Strany 93

Configuring Secure Socket Layer (SSL) Common Errors in SSL setup — This page is intentionally unused. — 7-22

Strany 94 - How Authentication Operates

8 Configuring Port-Based Access Control (802.1X) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 95

Configuring Port-Based Access Control (802.1X) Contents Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches

Strany 96

Configuring Port-Based Access Control (802.1X) Overview Overview Feature Default Menu CLI Web Configuring Switch Ports as 802.1X Authenticators D

Strany 97 - Using the Encryption Key

Configuring Port-Based Access Control (802.1X) Overview  Local authentication of 802.1X clients using the switch’s local user-name and password (as

Strany 98 - Access When Using TACACS+

Configuring Port-Based Access Control (802.1X) Overview RADIUS ServerLAN Core 802.1X-Aware Client (Supplicant) Switch Running 802.1X and Connected as

Strany 99 - Messages Related to TACACS+

Configuring Port-Based Access Control (802.1X) How 802.1X Operates How 802.1X Operates Authenticator Operation This operation provides security on a d

Strany 100 - Operating Notes

Configuring Port-Based Access Control (802.1X) How 802.1X Operates Switch-Port Supplicant Operation This operation provides security on links between

Strany 101 - Contents

Getting Started Port Identity Convention for Examples Screen Simulations Figures containing simulated screen text and command output appear similar to

Strany 102 - Overview

Configuring Port-Based Access Control (802.1X) Terminology • A “failure” response continues the block on port B5 and causes port A1 to wait for the “

Strany 103 - Terminology

Configuring Port-Based Access Control (802.1X) Terminology EAP (Extensible Authentication Protocol): EAP enables network access that supports multiple

Strany 104

Configuring Port-Based Access Control (802.1X) General Operating Rules and Notes member of that VLAN as long as at least one other port on the switch

Strany 105

Configuring Port-Based Access Control (802.1X) General Operating Rules and Notes  If a client already has access to a switch port when you configure

Strany 106 - Authentication

Configuring Port-Based Access Control (802.1X) General Setup Procedure for Port-Based Access Control (802.1X) General Setup Procedure for Port-Based A

Strany 107

Configuring Port-Based Access Control (802.1X) General Setup Procedure for Port-Based Access Control (802.1X) Overview: Configuring 802.1X Authenticat

Strany 108 - Want RADIUS To Protect

Configuring Port-Based Access Control (802.1X) General Setup Procedure for Port-Based Access Control (802.1X) 7. If you are using Port Security on th

Strany 109 - SSH authentication

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports as 802.1X Authenticators Configuring Switch Ports as 802.1X Authenticators 802

Strany 110

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports as 802.1X Authenticators Syntax: aaa port-access authenticator < port-list

Strany 111

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports as 802.1X Authenticators Sets the period of time the switch waits for a suppli

Strany 113

Getting Started Related Publications PDF version of this guide is also provided on the Product Documentation CD-ROM shipped with the switch. And you c

Strany 114

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports as 802.1X Authenticators Configures an existing, static VLAN to be the Autho-r

Strany 115

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports as 802.1X Authenticators 3. Configure the 802.1X Authentication Method This ta

Strany 116 - Local Authentication Process

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports as 802.1X Authenticators 4. Enter the RADIUS Host IP Address(es) If you select

Strany 117 - Access When Using RADIUS

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode 802.1X Open VLAN Mode 802.1X Authentication Commands page 8-15 802.1X Supplicant

Strany 118

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode 1. 1st Priority: The port joins a VLAN to which it has been assigned by a RADIUS

Strany 119

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode Table 8-1. 802.1X Open VLAN Mode Options 802.1X Per-Port Configuration Port Res

Strany 120

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode 802.1X Per-Port Configuration Port Response Open VLAN Mode with Only an Unauthor

Strany 121 -  IP address: 10.33.18.151

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode Operating Rules for Authorized-Client and Unauthorized-Client VLANs Condition Ru

Strany 122 - Reports to the RADIUS Server

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode Condition Rule Effect of Authorized-Client VLAN • When a client becomes authen

Strany 123 -  Stop-Only:

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode Setting Up and Configuring 802.1X Open VLAN Mode Preparation. This section assume

Strany 124 - Updating Options

Getting Started Getting Documentation From the Web Getting Documentation From the Web 1. Go to the HP ProCurve website at http://www.hp.com/go/hpproc

Strany 125 - Viewing RADIUS Statistics

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode  Ensure that the switch is connected to a RADIUS server configured to support a

Strany 126

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode 3. If you selected either eap-radius or chap-radius for step 2, use the radius h

Strany 127

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode Configuring 802.1X Open VLAN Mode. Use these commands to actually configure Open

Strany 128 - RADIUS Accounting Statistics

Configuring Port-Based Access Control (802.1X) 802.1X Open VLAN Mode Inspecting 802.1X Open VLAN Mode Operation. For information and an example on vi

Strany 129

Configuring Port-Based Access Control (802.1X) Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Devices  If an authentic

Strany 130

Configuring Port-Based Access Control (802.1X) Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Devices Note on If the po

Strany 131

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches Configuring

Strany 132

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches 1. When po

Strany 133

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches Configuring

Strany 134

Configuring Port-Based Access Control (802.1X) Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches aaa port-ac

Strany 135

Getting Started Sources for More Information Sources for More Information  If you need information on specific parameters in the menu interface, ref

Strany 136

Configuring Port-Based Access Control (802.1X) Displaying 802.1X Configuration, Statistics, and Counters Displaying 802.1X Configuration, Statistics,

Strany 137 - Public Key Formats

Configuring Port-Based Access Control (802.1X) Displaying 802.1X Configuration, Statistics, and Counters show port-access authenticator (Syntax Contin

Strany 138

Configuring Port-Based Access Control (802.1X) Displaying 802.1X Configuration, Statistics, and Counters Viewing 802.1X Open VLAN Mode Status You can

Strany 139

Configuring Port-Based Access Control (802.1X) Displaying 802.1X Configuration, Statistics, and Counters  When the Unauth VLAN ID is configured and

Strany 140

Configuring Port-Based Access Control (802.1X) Displaying 802.1X Configuration, Statistics, and Counters Status Indicator Meaning Unauthorized VLAN I

Strany 141 - Operation

Configuring Port-Based Access Control (802.1X) Displaying 802.1X Configuration, Statistics, and Counters Show Commands for Port-Access Supplicant Synt

Strany 142

Configuring Port-Based Access Control (802.1X) How RADIUS/802.1X Authentication Affects VLAN Operation supplicant port to another without clearing the

Strany 143

Configuring Port-Based Access Control (802.1X) How RADIUS/802.1X Authentication Affects VLAN Operation For example, suppose that a RADIUS-authenticate

Strany 144 - Key for the

Configuring Port-Based Access Control (802.1X) How RADIUS/802.1X Authentication Affects VLAN Operation This entry shows that port A2 is temporarily un

Strany 145 - Modulus <n>

Configuring Port-Based Access Control (802.1X) How RADIUS/802.1X Authentication Affects VLAN Operation When the 802.1X client’s session on port A2 end

Strany 146

Getting Started Need Only a Quick Start?  If you need further information on Hewlett-Packard switch tech-nology, visit the HP ProCurve website at: h

Strany 147 - Client Contact Behavior

Configuring Port-Based Access Control (802.1X) Messages Related to 802.1X Operation Messages Related to 802.1X Operation Table 8-3. 802.1X Operating

Strany 148 -  Execute no ip ssh

9 Configuring and Monitoring Port Security Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 149

Configuring and Monitoring Port Security Overview Overview Feature Default Menu CLI Web Displaying Current Port Security n/a — page 9-10 page

Strany 150

Configuring and Monitoring Port Security Overview General Operation for Port Security. On a per-port basis, you can configure security measures to blo

Strany 151

Configuring and Monitoring Port Security Overview Switch A Port Security Configured Switch B MAC Address Authorized by Switch A PC 1 MAC Address Autho

Strany 152

Configuring and Monitoring Port Security Planning Port Security Planning Port Security 1. Plan your port security configuration and monitoring accord

Strany 153 - Public-Key Authentication

Configuring and Monitoring Port Security Port Security Command Options and Operation Port Security Command Options and Operation Port Security Command

Strany 154

Configuring and Monitoring Port Security Port Security Command Options and Operation Syntax: port-security [e] < port-list > learn-mode < co

Strany 155 - Comment

Configuring and Monitoring Port Security Port Security Command Options and Operation Syntax: port-security [e] < port-list > (- Continued -) le

Strany 156

Configuring and Monitoring Port Security Port Security Command Options and Operation Syntax: port-security [e] < port-list > (- Continued -) ac

Strany 157 - Key Index Number

Getting Started To Set Up and Install the Switch in Your Network — This page is intentionally unused. — 1-12

Strany 158

Configuring and Monitoring Port Security Port Security Command Options and Operation Retention of Static MAC Addresses Learned MAC Addresses In the fo

Strany 159

Configuring and Monitoring Port Security Port Security Command Options and Operation Using the CLI To Display Port Security Settings. Syntax: show por

Strany 160 - Message Meaning

Configuring and Monitoring Port Security Port Security Command Options and Operation The following command example shows the option for entering a ran

Strany 161

Configuring and Monitoring Port Security Port Security Command Options and Operation HPswitch(config)# port-security a1 learn-mode static mac-address

Strany 162

Configuring and Monitoring Port Security Port Security Command Options and Operation The Address Limit has not been reached. Although the Address Limi

Strany 163

Configuring and Monitoring Port Security Port Security Command Options and Operation If you are adding a device (MAC address) to a port on which the A

Strany 164

Configuring and Monitoring Port Security Port Security Command Options and Operation To remove a device (MAC address) from the “Authorized” list and w

Strany 165 - Prerequisite for Using SSL

Configuring and Monitoring Port Security MAC Lockdown Figure 9-8. Example of Port A1 After Removing One MAC Address MAC Lockdown MAC Lockdown is avali

Strany 166

Configuring and Monitoring Port Security MAC Lockdown How It Works. When a device’s MAC address is locked down to a port (typically in a pair with a V

Strany 167

Configuring and Monitoring Port Security MAC Lockdown You cannot perform MAC Lockdown and 802.1x authentication on the same port or on the same MAC ad

Strany 168 - Security Tab

2 Configuring Username and Password Security Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 169

Configuring and Monitoring Port Security MAC Lockdown MAC Lockdown Operating Notes Limits. There is a limit of 500 MAC Lockdowns that you can safely

Strany 170

Configuring and Monitoring Port Security MAC Lockdown Deploying MAC Lockdown When you deploy MAC Lockdown you need to consider how you use it within y

Strany 171 - Generate New Certificate

Configuring and Monitoring Port Security MAC Lockdown 3400cl or 5300xl Switch 3400cl or 5300xl Switch 3400cl or 5300xl Switch 3400cl or 5300xl Switch

Strany 172

Configuring and Monitoring Port Security MAC Lockdown The key points for this Model Topology are: • The Core Network is separated from the edge by th

Strany 173

Configuring and Monitoring Port Security MAC Lockdown M i x e d U s e r s Internal Network External Network Switch 1 Server A Server A is locked dow

Strany 174 - [SSL] button

Configuring and Monitoring Port Security MAC Lockout Displaying status. Locked down ports are listed in the output of the show running-config command

Strany 175 - Browser Interface

Configuring and Monitoring Port Security MAC Lockout Lockout command (lockout-mac <mac-address>). When the wireless clients then attempt to use

Strany 176

Configuring and Monitoring Port Security Web: Displaying and Configuring Port Security Features HPswitch# show lockout-mac Locked Out Addresses 0 0734

Strany 177 - Browser Contact Behavior

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags 4. Implement your new data by clicking on [Apply Changes]

Strany 178

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags • In an active network management environment via an SNMP

Strany 179

Configuring Username and Password Security Overview Overview Feature Default Menu CLI Web Set Usernames none — — page 2-6 Set a Password none

Strany 180 - Enable SLL

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Note on On a given port, if the intrusion action is to se

Strany 181 - Common Errors in SSL setup

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags 2. Type [I] (Intrusion log) to display the Intrusion Log.

Strany 182

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags provides a history of the last 20 intrusions detected by t

Strany 183 - (802.1X)

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags CLI: Checking for Intrusions, Listing Intrusion Alerts, an

Strany 184

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Dates and Times of Intrusions MAC Address of latest Intrud

Strany 185

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Using the Event Log To Find Intrusion Alerts The Event Log

Strany 186

Configuring and Monitoring Port Security Operating Notes for Port Security a. Click on the Security tab. b. Click on [Intrusion Log]. “Ports with In

Strany 187 - 802.1X access. Refer to

Configuring and Monitoring Port Security Operating Notes for Port Security LACP Not Available on Ports Configured for Port Security. To main-tain sec

Strany 188 - How 802.1X Operates

Configuring and Monitoring Port Security Operating Notes for Port Security — This page is intentionally unused. — 9-38

Strany 189

10 Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 190

Configuring Username and Password Security Overview To configure password security: 1. Set a Manager password pair (and an Operator password pair, if

Strany 191 - 802.1X standard

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Overview Overview Applicable Switch Models. Traffic/Security filters a

Strany 192

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Overview to drop traffic. (Destination ports that comprise a trunk are

Strany 193

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters case, you can prevent the traffic of one subn

Strany 194 - Access Control (802.1X)

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters Configuring a Source-Port Filter The source-p

Strany 195

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters Configuring a Filter on a Port Trunk. This o

Strany 196

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters Viewing a Source-Port Filter You can list all

Strany 197 - Authenticators

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters If you wanted to determine the index number f

Strany 198

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters Editing a Source-Port Filter The switch inclu

Strany 199

Traffic/Security Filters (HP ProCurve Series 2600/2600-PWR and 2800 Switches) Using Source-Port Filters — This page is intentionally unused. — 10-10

Strany 200

11 Using Authorized IP Managers Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 201

Configuring Username and Password Security Configuring Local Password Security  Delete passwords  Recover from a lost password Configuring Local P

Strany 202

Using Authorized IP Managers Overview Overview Authorized IP Manager Features Feature Default Menu CLI Web Listing (Showing) Authorized Managers n

Strany 203 - 802.1X Open VLAN Mode

Using Authorized IP Managers Options Options You can configure:  Up to 10 authorized manager addresses, where each address applies to either a singl

Strany 204

Using Authorized IP Managers Defining Authorized Management Stations  Operator: Allows read-only access from the web browser and console interfaces.

Strany 205

Using Authorized IP Managers Defining Authorized Management Stations for the Authorized Manager IP parameter allows a range of 0 through 255 in the 4t

Strany 206

Using Authorized IP Managers Defining Authorized Management Stations 2. Enter an Authorized Manager IP address here. 5. Press [Enter], then [S] (for

Strany 207 - Unauthorized-Client VLANs

Using Authorized IP Managers Defining Authorized Management Stations Figure 11-3. Example of the Show IP Authorized-Manager Display The above example

Strany 208

Using Authorized IP Managers Defining Authorized Management Stations Similarly, the next command authorizes manager-level access for any station havin

Strany 209

Using Authorized IP Managers Web: Configuring IP Authorized Managers Web: Configuring IP Authorized Managers In the web browser interface you can conf

Strany 210

Using Authorized IP Managers Building IP Masks Table 11-1. Analysis of IP Mask for Single-Station Entries 1st Octet 2nd Octet 3rd Octet 4th Octet Man

Strany 211

Using Authorized IP Managers Building IP Masks Configuring Multiple Stations Per Authorized Manager IP Entry The mask determines whether the IP addres

Strany 212

Configuring Username and Password Security Configuring Local Password Security To Delete Password Protection (Including Recovery from a Lost Password)

Strany 213

Using Authorized IP Managers Building IP Masks Figure 11-5. Analysis of IP Mask for Multiple-Station Entries 1st Octet 2nd Octet 3rd Octet 4th Octet M

Strany 214 - 802.1X Devices

Using Authorized IP Managers Operating Notes Additional Examples for Authorizing Multiple Stations Entries for Authorized Manager List Results IP Mask

Strany 215 - 802.1X Device

Using Authorized IP Managers Operating Notes • Even if you need proxy server access enabled in order to use other applications, you can still elimina

Strany 216 - Other Switches

Numerics 3DES … 6-3, 7-3 802.1X See port-based access control. …8-1 A aaa authentication … 4-8 aaa port-access See Web or MAC Authentication. access l

Strany 217

IP authorized IP managers … 11-1 reserved port numbers … 6-17 IP masks building … 11-9 for multiple authorized manager stations … 11-11 for single au

Strany 218

block traffic … 8-3 blocking non-802.1X device … 8-33 CHAP … 8-3 chap-radius … 8-19 configuration commands … 8-15 configuration overview … 8-13 config

Strany 219

configuring switch global parameters … 5-12 general setup … 5-5 local authentication … 5-9 MD5…5-4 messages … 5-31 network accounting … 5-18 operating

Strany 220 - Statistics, and Counters

disabling … 7-10 enabling … 7-17 erase certificate key pair … 7-10 erase host key pair … 7-10 generate CA-signed certificate … 7-15 generate host key

Strany 221

U user name cleared … 2-5 V value, inconsistent … 9-14 VLAN 802.1X … 8-44 802.1X, ID changes … 8-47 802.1X, suspend untagged VLAN … 8-41 filter, sourc

Strany 223

HP ProCurve Switch 2600 Series Switch 2600-PWR Series Switch 2800 Series Switch 4100gl Series Switch 6108 Access Security Guide October 2004

Strany 224

Configuring Username and Password Security Configuring Local Password Security • Password entries appear as asterisks. • You must type the password

Strany 225 -  The switch reboots

Technical information in this documentis subject to change without notice.©Copyright 2000, 2004.Hewlett-Packard Development Company, L.P.Reproduction,

Strany 226 - Affects VLAN Operation

Configuring Username and Password Security Front-Panel Security • To remove username and password protection, leave the fields blank. 3. Implement t

Strany 227

Configuring Username and Password Security Front-Panel Security the switch vulnerable when it is located in an area where non-authorized people have a

Strany 228

Configuring Username and Password Security Front-Panel Security Front-Panel Button Functions The front panel of the switch includes the Reset button a

Strany 229 - After the 802.1X session

Configuring Username and Password Security Front-Panel Security Reset Button Pressing the Reset button alone for one second causes the switch to reboo

Strany 230

Configuring Username and Password Security Front-Panel Security 3. Release the Reset button and wait for about one second for the Self-Test LED to st

Strany 231

Configuring Username and Password Security Front-Panel Security Configuring Front-Panel Security Using the front-panel-security command from the globa

Strany 232

Configuring Username and Password Security Front-Panel Security Password Recovery: Shows whether the switch is configured with the ability to recover

Strany 233

Configuring Username and Password Security Front-Panel Security Indicates the command has disabled the Clear button on the switch’s front panel. In th

Strany 234 - • PC1 can access Switch A

Configuring Username and Password Security Front-Panel Security Re-Enabling the Clear Button on the Switch’s Front Panel and Setting or Changing the “

Strany 235 - Planning Port Security

© Copyright 2001-2004 Hewlett-Packard Company, L..P. The infor-mation contained herein is subject to change without notice. Publication Number 5990-60

Strany 236

Configuring Username and Password Security Front-Panel Security Shows password-clear disabled. Enables password-clear, with reset-on-clear disabled by

Strany 237

Configuring Username and Password Security Front-Panel Security The command to disable the factory-reset operation produces this caution. To complete

Strany 238

Configuring Username and Password Security Front-Panel Security Syntax: [no] front-panel-security password-recovery Enables or (using the “no” form o

Strany 239

Configuring Username and Password Security Front-Panel Security Figure 2-11. Example of the Steps for Disabling Password-Recovery Password Recovery Pr

Strany 240 - Learned MAC Addresses

Configuring Username and Password Security Front-Panel Security — This page is intentionally unused. — 2-20

Strany 241

3 Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 242 - Configuring Port Security

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Overview Overview Feature Default Menu CLI Web Configure Web Authenticat

Strany 243

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Overview MAC Authentication (MAC-Auth). This method grants access to a secu

Strany 244

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Overview General Features Web and MAC Authentication on the Series 5300XL sw

Strany 245

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches How Web and MAC Authentication Operate How Web and MAC Authentication Operat

Strany 246

Contents 1 Getting Started Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-

Strany 247 - MAC Lockdown

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches How Web and MAC Authentication Operate Figure 3-2. Progress Message During A

Strany 248

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches How Web and MAC Authentication Operate moves have not been enabled (client-m

Strany 249

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches How Web and MAC Authentication Operate 4. If neither 1, 2, or 3, above, app

Strany 250 - MAC Lockdown Operating Notes

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Terminology Terminology Authorized-Client VLAN: Like the Unauthorized-Client

Strany 251 - Deploying MAC Lockdown

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Operating Rules and Notes Operating Rules and Notes  You can configure one

Strany 252

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Operating Rules and Notes 2. If there is no RADIUS-assigned VLAN, then, for

Strany 253

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches General Setup Procedure for Web/MAC Authentication Note on Web/ The switch

Strany 254

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches General Setup Procedure for Web/MAC Authentication a. If you configure the

Strany 255 - MAC Lockout

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches General Setup Procedure for Web/MAC Authentication Additional Information fo

Strany 256

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring the Switch To Access a RADIUS Server Configuring the Switch To A

Strany 257 - Security Features

Configuring Front-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12 Password Recovery . . . . . . . . . . . . . . . . .

Strany 258 - Alert Flags

--------------- -----Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring the Switch To Access a RADIUS Server Option

Strany 259

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring Web Authentication on the Switch Configuring Web Authentication

Strany 260 - Resetting Alert Flags

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring Web Authentication on the Switch Note Client web browsers may n

Strany 261

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring Web Authentication on the Switch Syntax: aaa port-access web-ba

Strany 262 - 9-15, above.)

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring Web Authentication on the Switch Syntax: [no] aaa port-access w

Strany 263

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring Web Authentication on the Switch Syntax: aaa port-access web-ba

Strany 264

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring MAC Authentication on the Switch Syntax: [no] aaa port-access w

Strany 265 - [Overview] button

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring MAC Authentication on the Switch 5. Configure the switch for MA

Strany 266 - [?] in the web

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring MAC Authentication on the Switch Syntax: [no] aaa port-access m

Strany 267

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Configuring MAC Authentication on the Switch Specifies the period, in second

Strany 268

Terminology Used in TACACS Applications: . . . . . . . . . . . . . . . . . . . . . . . . 4-3 General System Requirements . . . . . . . . . . . . . .

Strany 269 - Traffic/Security Filters

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Show Status and Configuration of Web-Based Authentication Specifies the VLAN

Strany 270

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Show Status and Configuration of Web-Based Authentication Shows Web Authenti

Strany 271

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Show Status and Configuration of MAC-Based Authentication Show Status and Co

Strany 272 - Using Source-Port Filters

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Show Status and Configuration of MAC-Based Authentication Shows MAC Authenti

Strany 273

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Client Status Client Status The table below shows the possible client status

Strany 274

4 TACACS+ Authentication Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 275 - Viewing a Source-Port Filter

TACACS+ Authentication Overview Overview Feature Default Menu CLI Web view the switch’s authentication configuration n/a — page 4-9 — view the

Strany 276 - Filter Indexing

TACACS+ Authentication Terminology Used in TACACS Applications: tion services. If the switch fails to connect to any TACACS+ server, it defaults to it

Strany 277 - Editing a Source-Port Filter

TACACS+ Authentication Terminology Used in TACACS Applications: • Local Authentication: This method uses username/password pairs configured locally o

Strany 278

TACACS+ Authentication General System Requirements General System Requirements To use TACACS+ authentication, you need the following:  A TACACS+ ser

Strany 279 - Using Authorized IP Managers

Controlling Web Browser Interface Access When Using RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 280

TACACS+ Authentication General Authentication Setup Procedure other access type (console, in this case) open in case the Telnet access fails due to a

Strany 281 - Access Levels

TACACS+ Authentication General Authentication Setup Procedure Note on Privilege Levels Caution When a TACACS+ server authenticates an access request

Strany 282 - Stations

TACACS+ Authentication Configuring TACACS+ on the Switch configuration in your TACACS+ server application for mis-configura-tions or missing data that

Strany 283 - Managers

TACACS+ Authentication Configuring TACACS+ on the Switch CLI Commands Described in this Section Command Page show authentication show tacacs aaa auth

Strany 284

TACACS+ Authentication Configuring TACACS+ on the Switch Viewing the Switch’s Current TACACS+ Server Contact Configuration This command lists the time

Strany 285

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring the Switch’s Authentication Methods The aaa authentication command configures the

Strany 286

TACACS+ Authentication Configuring TACACS+ on the Switch Table 4-1. AAA Authentication Parameters Name Default Range Function console n/a n/a S

Strany 287 - Building IP Masks

TACACS+ Authentication Configuring TACACS+ on the Switch Table 4-2. Primary/Secondary Authentication Table Access Method and Privilege Level Authenti

Strany 288

TACACS+ Authentication Configuring TACACS+ on the Switch For example, here is a set of access options and the corresponding commands to configure them

Strany 289 - IP Entry

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring the Switch’s TACACS+ Server Access The tacacs-server command configures these par

Strany 290

7 Configuring Secure Socket Layer (SSL) Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 291

TACACS+ Authentication Configuring TACACS+ on the Switch Note on Encryption Keys Syntax: tacacs-server host < ip-addr > [key < key-string &

Strany 292

TACACS+ Authentication Configuring TACACS+ on the Switch Table 4-3. Details on Configuring TACACS Servers and Keys Name Default Range tacacs-server

Strany 293 - Index – 1

TACACS+ Authentication Configuring TACACS+ on the Switch Name Default Range [ key <key-string> ] none (null) n/a Specifies the optional, glo

Strany 294 - 2 – Index

TACACS+ Authentication Configuring TACACS+ on the Switch The “10” server is now the “first-choice” TACACS+ authentication device. Figure 4-5. Example

Strany 295 - Index – 3

TACACS+ Authentication How Authentication Operates To delete a per-server encryption key in the switch, re-enter the tacacs-server host command withou

Strany 296 - 4 – Index

TACACS+ Authentication How Authentication Operates Using figure 4-6, above, after either switch detects an operator’s logon request from a remote or d

Strany 297 - Index – 5

TACACS+ Authentication How Authentication Operates Local Authentication Process When the switch is configured to use TACACS+, it reverts to local auth

Strany 298 - 6 – Index

TACACS+ Authentication How Authentication Operates Using the Encryption Key General Operation When used, the encryption key (sometimes termed “key”, “

Strany 299

TACACS+ Authentication Controlling Web Browser Interface Access When Using TACACS+ Authentication For example, you would use the next command to confi

Strany 300 - 5990-6024

TACACS+ Authentication Messages Related to TACACS+ Operation Messages Related to TACACS+ Operation The switch generates the CLI messages listed below.

Příbuzné modely 6108

Komentáře k této Příručce

Žádné komentáře