HP 2600-PWR Manuale Utente

Navigare online o scaricare Manuale Utente per Switch di rete HP 2600-PWR. HP 2600-PWR User's Manual Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 306
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti

Sommario

Pagina 1 - Access Security Guide

ProCurve Switches Access Security Guide Switch 2600 Series Switch 2600-PWR Series Switch 2800 Series Switch 4100 Series Switch 6108 Series

Pagina 2

viiiConfiguring Switch Ports as 802.1X Authenticators . . . . . . . . . . . . . . . . . 8-151. Enable 802.1X Authentication on Selected Ports . .

Pagina 3 - December 2008

4-26TACACS+ AuthenticationConfiguring TACACS+ on the Switch When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ se

Pagina 4

5-15RADIUS Authentication and AccountingContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 5

5-2RADIUS Authentication and AccountingOverviewOverviewRADIUS (Remote Authentication Dial-In User Service) enables you to use up to three servers (one

Pagina 6 - 2600-PWR and 2800 Switches

5-3RADIUS Authentication and AccountingTerminologyTerminologyCHAP (Challenge-Handshake Authentication Protocol): A challenge-response authentication p

Pagina 7 - 4 TACACS+ Authentication

5-4RADIUS Authentication and AccountingSwitch Operating Rules for RADIUSSwitch Operating Rules for RADIUS You must have at least one RADIUS server ac

Pagina 8

5-5RADIUS Authentication and AccountingGeneral RADIUS Setup ProcedureGeneral RADIUS Setup ProcedurePreparation:1. Configure one to three RADIUS server

Pagina 9

5-6RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationConfiguring the Switch for RADIUS Authentication• Determine an

Pagina 10

5-7RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationOutline of the Steps for Configuring RADIUS AuthenticationThere

Pagina 11 - 10 Traffic/Security Filters

5-8RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication• Server Dead-Time: The period during which the switch will not

Pagina 12

5-9RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have already configured local password

Pagina 13 - Product Documentation

ixMAC Lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-17Differences Between MAC Lockdown an

Pagina 14 - Feature Index

5-10RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication2. Configure the Switch To Access a RADIUS ServerThis section

Pagina 15

5-11RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have configured the switch as shown i

Pagina 16

5-12RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication3. Configure the Switch’s Global RADIUS ParametersYou can conf

Pagina 17 - Getting Started

5-13RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication Note Where the switch has multiple RADIUS servers configured

Pagina 18 - Introduction

5-14RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose that your switch is configured to use thr

Pagina 19

5-15RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFigure 5-6. Listings of Global RADIUS Parameters Configured In

Pagina 20

5-16RADIUS Authentication and AccountingLocal Authentication ProcessLocal Authentication ProcessWhen the switch is configured to use RADIUS, it revert

Pagina 21 - Conventions

5-17RADIUS Authentication and AccountingControlling Web Browser Interface Access When Using RADIUS AuthenticationControlling Web Browser Interface Acc

Pagina 22 - Port Identity Examples

5-18RADIUS Authentication and AccountingConfiguring RADIUS AccountingNote This section assumes you have already: Configured RADIUS authentication on

Pagina 23 - Sources for More Information

5-19RADIUS Authentication and AccountingConfiguring RADIUS AccountingThe switch forwards the accounting information it collects to the designated RADI

Pagina 24 - Need Only a Quick Start?

xDefining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . . . . . 11-4Overview of IP Mask Operation . . . . . . . . . . . .

Pagina 25

5-20RADIUS Authentication and AccountingConfiguring RADIUS Accounting– Optional—if you are also configuring the switch for RADIUS authentication, and

Pagina 26

5-21RADIUS Authentication and AccountingConfiguring RADIUS Accounting(For a more complete description of the radius-server command and its options, tu

Pagina 27

5-22RADIUS Authentication and AccountingConfiguring RADIUS AccountingFigure 5-7. Example of Configuring for a RADIUS Server with a Non-Default Account

Pagina 28

5-23RADIUS Authentication and AccountingConfiguring RADIUS Accounting Start-Stop: • Send a start record accounting notice at the beginning of the acc

Pagina 29

5-24RADIUS Authentication and AccountingConfiguring RADIUS Accounting3. (Optional) Configure Session Blocking and Interim Updating OptionsThese option

Pagina 30 - Menu: Setting Passwords

5-25RADIUS Authentication and AccountingViewing RADIUS StatisticsViewing RADIUS StatisticsGeneral RADIUS StatisticsFigure 5-10. Example of General RAD

Pagina 31

5-26RADIUS Authentication and AccountingViewing RADIUS StatisticsTable 5-2. Values for Show Radius Host Output (Figure 5-11)Term DefinitionRound Trip

Pagina 32

5-27RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Authentication StatisticsFigure 5-12. Example of Login Attempt and Primary/Sec

Pagina 33 - Front-Panel Security

5-28RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Accounting StatisticsFigure 5-14. Listing the Accounting Configuration in the

Pagina 34 - Front-Panel Button Functions

5-29RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderFigure 5-16. Example Listing of Active RADIUS Accounting Sessions on the Sw

Pagina 35 - Reset Button

xiProduct DocumentationAbout Your Switch Manual SetThe switch manual set includes the following: Read Me First - a printed guide shipped with your sw

Pagina 36

5-30RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderTo exchange the positions of the addresses so that the server at 10.10.10.0

Pagina 37

5-31RADIUS Authentication and AccountingMessages Related to RADIUS OperationMessages Related to RADIUS OperationMessage MeaningCan’t reach RADIUS serv

Pagina 38

5-32RADIUS Authentication and AccountingMessages Related to RADIUS Operation— This page is intentionally unused. —

Pagina 39

6-16Configuring Secure Shell (SSH)ContentsContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 40

6-2Configuring Secure Shell (SSH)OverviewOverviewThe ProCurve switches covered in this guide use Secure Shell version 1 or 2 (SSHv1 or SSHv2) to provi

Pagina 41 - Password Recovery

6-3Configuring Secure Shell (SSH)OverviewNote SSH in the ProCurve is based on the OpenSSH software toolkit. For more information on OpenSSH, visit htt

Pagina 42 - [N] (for “No”)

6-4Configuring Secure Shell (SSH)TerminologyTerminology SSH Server: A ProCurve switch with SSH enabled. Key Pair: A pair of keys generated by the sw

Pagina 43 - Password Recovery Process

6-5Configuring Secure Shell (SSH)Prerequisite for Using SSHPrerequisite for Using SSHBefore using the switch as an SSH server, you must install a publ

Pagina 44

6-6Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationSteps for Configuring and Using SSH for Switc

Pagina 45

6-7Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationB. Switch Preparation1. Assign a login (Opera

Pagina 46

xiiProduct DocumentationFeature IndexFor the manual set supporting your switch model, the following feature index indicates which manual to consult fo

Pagina 47 - Client Options

6-8Configuring Secure Shell (SSH)General Operating Rules and NotesGeneral Operating Rules and Notes Public keys generated on an SSH client must be ex

Pagina 48 - General Features

6-9Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationConfiguring the Switch for SSH Operation1. Assign Local Login (Operator) and

Pagina 49 - Authenticator Operation

6-10Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-5. Example of Configuring Local Passwords2. Generate the Switch’s P

Pagina 50

6-11Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationNotes When you generate a host key pair on the switch, the switch places the

Pagina 51 - MAC-based Authentication

6-12Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFor example, to generate and display a new key:Figure 6-6. Example of Genera

Pagina 52

6-13Configuring Secure Shell (SSH)Configuring the Switch for SSH Operationdistribution to clients is to use a direct, serial connection between the sw

Pagina 53

6-14Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation4. Add any data required by your SSH client application. For example Before

Pagina 54 - Operating Rules and Notes

6-15Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-10. Examples of Visual Phonetic and Hexadecimal Conversions of the

Pagina 55

6-16Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationSSH Client Contact Behavior. At the first contact between the switch and an

Pagina 56

6-17Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationThe ip ssh key-size command affects only a per-session, internal server key

Pagina 57

xiiiProduct DocumentationLACP X --Link X - -LLDP X --MAC Address Management X - -MAC Lockdown - - XMAC Lockout - - XMAC-based Authentication - - XM

Pagina 58 - Addresses

6-18Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationCaution Protect your private key file from access by anyone other than yours

Pagina 59 - RADIUS Server

6-19Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationOption B: Configuring the Switch for Client Public-Key SSH Authentication.

Pagina 60

6-20Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFor example, assume that you have a client public-key file named Client-Keys

Pagina 61

6-21Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFigure 6-13 shows how to check the results of the above c

Pagina 62

6-22Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationWhen configured for SSH operation, the switch automatical

Pagina 63

6-23Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key Authenticationa. Combines the decrypted byte sequence with specific ses

Pagina 64

6-24Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key Authentication1. Use your SSH client application to create a public/pri

Pagina 65

6-25Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFor example, if you wanted to copy a client public-key fi

Pagina 66

6-26Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationEnabling Client Public-Key Authentication. After you TFT

Pagina 67

6-27Configuring Secure Shell (SSH)Messages Related to SSH OperationMessages Related to SSH OperationMessage Meaning00000K Peer unreachable.Indicates a

Pagina 68

xivProduct DocumentationSource-Port Filters - - XSpanning Tree (STP, RSTP, MSTP) - X -SSH (Secure Shell) Encryption - - XSSL (Secure Socket Layer) -

Pagina 69

6-28Configuring Secure Shell (SSH)Messages Related to SSH OperationGenerating new RSA host key. If the cache is depleted, this could take up to two m

Pagina 70 - Web-Based Authentication

7-17Configuring Secure Socket Layer (SSL)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 71 - MAC-Based Authentication

7-2Configuring Secure Socket Layer (SSL)OverviewOverviewThe ProCurve switches covered by this manual use Secure Socket Layer Version 3 (SSLv3) and sup

Pagina 72

7-3Configuring Secure Socket Layer (SSL)TerminologyFigure 7-1. Switch/User AuthenticationSSL on the ProCurve switches supports these data encryption m

Pagina 73 - Show Client Status

7-4Configuring Secure Socket Layer (SSL)Terminology Self-Signed Certificate: A certificate not verified by a third-party certificate authority (CA).

Pagina 74

7-5Configuring Secure Socket Layer (SSL)Prerequisite for Using SSLPrerequisite for Using SSLBefore using the switch as an SSL server, you must install

Pagina 75

7-6Configuring Secure Socket Layer (SSL)General Operating Rules and NotesGeneral Operating Rules and Notes Once you generate a certificate on the swi

Pagina 76

7-7Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationConfiguring the Switch for SSL Operation1. Assign Local Login (Operato

Pagina 77 - Applications:

7-8Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationUsing the web browser interface To Configure Local Passwords. You can

Pagina 78

7-9Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL Operation2. Generate the Switch’s Server Host Certificate You must generate a s

Pagina 79 - General System Requirements

1-11Getting StartedContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Ov

Pagina 80

7-10Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationTo Generate or Erase the Switch’s Server Certificate with the CLIBeca

Pagina 81 - Privilege Levels

7-11Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationComments on Certificate Fields. There are a number arguments used in

Pagina 82 - Before You Begin

7-12Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationNotes “Zeroizing” the switch’s server host certificate or key automat

Pagina 83 - Configuration

7-13Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationGenerate a Self-Signed Host Certificate with the Web browser interfac

Pagina 84

7-14Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationFor example, to generate a new host certificate via the web browsers

Pagina 85

7-15Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationFigure 7-6. Web browser Interface showing current SSL Host Certificat

Pagina 86

7-16Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationThe installation of a CA-signed certificate involves interaction with

Pagina 87 - Login Primary

7-17Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL Operation Figure 7-7. Example of a Certificate Request and Reply3. Enable SSL

Pagina 88

7-18Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationNote Before enabling SSL on the switch you must generate the switch’s

Pagina 89

7-19Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationUsing the CLI interface to enable SSLTo enable SSL on the switch1. Ge

Pagina 90 - Encryption Keys

1-2Getting StartedIntroductionIntroductionThis Access Security Guide describes how to use ProCurve’s switch security features to protect access to you

Pagina 91

7-20Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationFigure 7-8. Using the web browser interface to enable SSL and select

Pagina 92 - First-Choice TACACS+ Server

7-21Configuring Secure Socket Layer (SSL)Common Errors in SSL SetupCommon Errors in SSL SetupError During Possible CauseGenerating host certificate on

Pagina 93

7-22Configuring Secure Socket Layer (SSL)Common Errors in SSL Setup— This page is intentionally unused. —

Pagina 94 - How Authentication Operates

8-18Configuring Port-Based Access Control (802.1X)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 95

8-2Configuring Port-Based Access Control (802.1X)ContentsConfiguring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches

Pagina 96

8-3Configuring Port-Based Access Control (802.1X)OverviewOverviewWhy Use Port-Based Access Control?Local area networks are often deployed in a way tha

Pagina 97 - Using the Encryption Key

8-4Configuring Port-Based Access Control (802.1X)Overview Local authentication of 802.1X clients using the switch’s local user-name and password (as

Pagina 98 - Access When Using TACACS+

8-5Configuring Port-Based Access Control (802.1X)Overview Figure 8-1. Example of an 802.1X ApplicationAccounting . The switch also provides RADIUS Ne

Pagina 99 - Messages Related to TACACS+

8-6Configuring Port-Based Access Control (802.1X)How 802.1X OperatesHow 802.1X OperatesAuthenticator OperationThis operation provides security on a di

Pagina 100 - TACACS+ Authentication

8-7Configuring Port-Based Access Control (802.1X)How 802.1X OperatesSwitch-Port Supplicant OperationThis operation provides security on links between

Pagina 101 - Contents

1-3Getting StartedOverview of Access Security Features Secure Socket Layer (SSL) (page 7-1): Provides remote web access to the switch via encrypted a

Pagina 102 - Overview

8-8Configuring Port-Based Access Control (802.1X)Terminology• A “failure” response continues the block on port B5 and causes port A1 to wait for the “

Pagina 103 - Terminology

8-9Configuring Port-Based Access Control (802.1X)TerminologyEAP (Extensible Authentication Protocol): EAP enables network access that supports multipl

Pagina 104

8-10Configuring Port-Based Access Control (802.1X)General Operating Rules and Notesmember of that VLAN as long as at least one other port on the switc

Pagina 105

8-11Configuring Port-Based Access Control (802.1X)General Operating Rules and Notes If a client already has access to a switch port when you configur

Pagina 106 - Authentication

8-12Configuring Port-Based Access Control (802.1X)General Setup Procedure for Port-Based Access Control (802.1X)General Setup Procedure for Port-Based

Pagina 107

8-13Configuring Port-Based Access Control (802.1X)General Setup Procedure for Port-Based Access Control (802.1X)Overview: Configuring 802.1X Authentic

Pagina 108 - Want RADIUS To Protect

8-14Configuring Port-Based Access Control (802.1X)General Setup Procedure for Port-Based Access Control (802.1X)7. If you are using Port Security on t

Pagina 109 - SSH authentication

8-15Configuring Port-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsConfiguring Switch Ports as 802.1X Authenticators1.

Pagina 110

8-16Configuring Port-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsSyntax: aaa port-access authenticator < port-lis

Pagina 111

8-17Configuring Port-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsSets the period of time the switch waits for a supp

Pagina 113

1-4Getting StartedOverview of Access Security FeaturesTable 1-1. Management Access Security ProtectionGeneral Switch Traffic Security GuidelinesWhere

Pagina 114

8-18Configuring Port-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators Configures an existing, static VLAN to be the Aut

Pagina 115

8-19Configuring Port-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators3. Configure the 802.1X Authentication MethodThis t

Pagina 116 - Local Authentication Process

8-20Configuring Port-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators4. Enter the RADIUS Host IP Address(es)If you selec

Pagina 117 - Configuring RADIUS Accounting

8-21Configuring Port-Based Access Control (802.1X)802.1X Open VLAN Mode802.1X Open VLAN ModeThis section describes how to use the 802.1X Open VLAN mod

Pagina 118

8-22Configuring Port-Based Access Control (802.1X)802.1X Open VLAN Mode1. 1st Priority: The port joins a VLAN to which it has been assigned by a RADIU

Pagina 119

8-23Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeTable 8-1. 802.1X Open VLAN Mode Options802.1X Per-Port Configuration Port Resp

Pagina 120

8-24Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeOpen VLAN Mode with Only an Unauthorized-Client VLAN Configured:• When the port

Pagina 121

8-25Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeOperating Rules for Authorized-Client and Unauthorized-Client VLANsCondition Ru

Pagina 122 - Reports to the RADIUS Server

8-26Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeNote: If you use the same VLAN as the Unauthorized-Client VLAN for all authenti

Pagina 123

8-27Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeSetting Up and Configuring 802.1X Open VLAN ModePreparation. This section assum

Pagina 124 - Updating Options

1-5Getting StartedConventionsConventionsThis guide uses the following conventions for command syntax and displayed information.Feature Descriptions by

Pagina 125 - Viewing RADIUS Statistics

8-28Configuring Port-Based Access Control (802.1X)802.1X Open VLAN Mode Ensure that the switch is connected to a RADIUS server configured to support

Pagina 126

8-29Configuring Port-Based Access Control (802.1X)802.1X Open VLAN Mode3. If you selected either eap-radius or chap-radius for step 2, use the radius

Pagina 127

8-30Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeConfiguring 802.1X Open VLAN Mode. Use these commands to actually configure Ope

Pagina 128 - RADIUS Accounting Statistics

8-31Configuring Port-Based Access Control (802.1X)802.1X Open VLAN ModeInspecting 802.1X Open VLAN Mode Operation. For information and an example on

Pagina 129

8-32Configuring Port-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Devices If an authenti

Pagina 130

8-33Configuring Port-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X DevicesNote on Blocking

Pagina 131 - as both the

8-34Configuring Port-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other SwitchesConfiguri

Pagina 132

8-35Configuring Port-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches1. When p

Pagina 133

8-36Configuring Port-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other SwitchesConfiguri

Pagina 134

8-37Configuring Port-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switchesaaa port-

Pagina 135 - http://www.openssh.com

1-6Getting StartedConventionsCommand PromptsIn the default configuration, your switch displays one of the following CLI prompts:ProCurve Switch 4104#P

Pagina 136

8-38Configuring Port-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersDisplaying 802.1X Configuration, Statistics

Pagina 137 - Public Key Formats

8-39Configuring Port-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Countersshow port-access authenticator (Syntax Cont

Pagina 138

8-40Configuring Port-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersViewing 802.1X Open VLAN Mode StatusYou can

Pagina 139

8-41Configuring Port-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Counters When the Unauth VLAN ID is configured and

Pagina 140

8-42Configuring Port-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 8-6. Example of Showing a VLAN with

Pagina 141 - Operation

8-43Configuring Port-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersShow Commands for Port-Access SupplicantNot

Pagina 142

8-44Configuring Port-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN Operationsupplicant port to another without clearing t

Pagina 143

8-45Configuring Port-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFor example, suppose that a RADIUS-authentica

Pagina 144 - Key for the

8-46Configuring Port-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFigure 8-8. The Active Configuration for VLAN

Pagina 145 - Modulus <n>

8-47Configuring Port-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationWhen the 802.1X client’s session on port A2 e

Pagina 146

1-7Getting StartedSources for More InformationSources for More InformationFor additional information about switch operation and features not covered i

Pagina 147 - Contact Behavior

8-48Configuring Port-Based Access Control (802.1X)Messages Related to 802.1X OperationMessages Related to 802.1X OperationTable 8-3. 802.1X Operating

Pagina 148 - ■ Execute no ip ssh

9-19Configuring and Monitoring Port SecurityContentsContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 149 - Note on Port

9-2Configuring and Monitoring Port SecurityOverviewOverviewUsing Port Security, you can configure each switch port with a unique list of the MAC addre

Pagina 150

9-3Configuring and Monitoring Port SecurityOverviewGeneral Operation for Port Security. On a per-port basis, you can configure security measures to bl

Pagina 151

9-4Configuring and Monitoring Port SecurityOverviewFigure 9-1. Example of How Port Security Controls AccessNote Broadcast and Multicast traffic is not

Pagina 152

9-5Configuring and Monitoring Port SecurityPlanning Port SecurityPlanning Port Security1. Plan your port security configuration and monitoring accordi

Pagina 153 - Public-Key Authentication

9-6Configuring and Monitoring Port SecurityPort Security Command Options and OperationPort Security Command Options and OperationPort Security Command

Pagina 154

9-7Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list >learn-mode < con

Pagina 155 - Bit Size Exponent <e>

9-8Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list > (- Continued -)lea

Pagina 156 - Note on Public

9-9Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list > (- Continued -)act

Pagina 157 - Key Index Number

1-8Getting StartedNeed Only a Quick Start?Figure 1-3. Getting Help in the CLI For information on specific features in the Web browser interface, use

Pagina 158

9-10Configuring and Monitoring Port SecurityPort Security Command Options and OperationRetention of Static MAC AddressesLearned MAC AddressesIn the fo

Pagina 159

9-11Configuring and Monitoring Port SecurityPort Security Command Options and OperationUsing the CLI To Display Port Security Settings. Syntax:show po

Pagina 160 - Message Meaning

9-12Configuring and Monitoring Port SecurityPort Security Command Options and OperationThe following command example shows the option for entering a r

Pagina 161

9-13Configuring and Monitoring Port SecurityPort Security Command Options and OperationProCurve(config)# port-security a1 learn-mode static mac-addres

Pagina 162

9-14Configuring and Monitoring Port SecurityPort Security Command Options and OperationFigure 9-4. Example of Adding an Authorized Device to a PortWit

Pagina 163

9-15Configuring and Monitoring Port SecurityPort Security Command Options and OperationIf you are adding a device (MAC address) to a port on which the

Pagina 164

9-16Configuring and Monitoring Port SecurityPort Security Command Options and OperationTo remove a device (MAC address) from the “Authorized” list and

Pagina 165 - Prerequisite for Using SSL

9-17Configuring and Monitoring Port SecurityMAC LockdownFigure 9-8. Example of Port A1 After Removing One MAC AddressMAC LockdownMAC Lockdown is avail

Pagina 166

9-18Configuring and Monitoring Port SecurityMAC LockdownHow It Works. When a device’s MAC address is locked down to a port (typically in a pair with a

Pagina 167

9-19Configuring and Monitoring Port SecurityMAC LockdownYou cannot perform MAC Lockdown and 802.1x authentication on the same port or on the same MAC

Pagina 168 - Security Tab

1-9Getting StartedNeed Only a Quick Start?To Set Up and Install the Switch in Your NetworkImportant! Use the Installation and Getting Started Guide sh

Pagina 169

9-20Configuring and Monitoring Port SecurityMAC LockdownMAC Lockdown Operating Notes Limits. There is a limit of 500 MAC Lockdowns that you can safel

Pagina 170

9-21Configuring and Monitoring Port SecurityMAC LockdownDeploying MAC LockdownWhen you deploy MAC Lockdown you need to consider how you use it within

Pagina 171 - Generate New Certificate

9-22Configuring and Monitoring Port SecurityMAC LockdownFigure 9-9. MAC Lockdown Deployed At the Network Edge Provides SecurityBasic MAC Lockdown Depl

Pagina 172 - Show host certificate command

9-23Configuring and Monitoring Port SecurityMAC LockdownThe key points for this Model Topology are:• The Core Network is separated from the edge by th

Pagina 173

9-24Configuring and Monitoring Port SecurityMAC LockdownFigure 9-10. Connectivity Problems Using MAC Lockdown with Multiple Paths The resultant connec

Pagina 174 - [SSL] button

9-25Configuring and Monitoring Port SecurityMAC LockoutDisplaying status. Locked down ports are listed in the output of the show running-config comman

Pagina 175 - Browser Interface

9-26Configuring and Monitoring Port SecurityMAC LockoutLockout command (lockout-mac <mac-address>). When the wireless clients then attempt to us

Pagina 176

9-27Configuring and Monitoring Port SecurityMAC LockoutFigure 9-12. Listing Locked Out PortsPort Security and MAC LockoutMAC Lockout is independent of

Pagina 177 - Browser Contact Behavior

9-28Configuring and Monitoring Port SecurityIP LockdownIP LockdownIP lockdown is available on the Series 2600 and 2800 switches only.The “IP lockdown”

Pagina 178

9-29Configuring and Monitoring Port SecurityWeb: Displaying and Configuring Port Security FeaturesWeb: Displaying and Configuring Port Security Featur

Pagina 179

1-10Getting StartedNeed Only a Quick Start?— This page is intentionally unused. —

Pagina 180

9-30Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert Flags• In the menu interface:– The Port Status screen include

Pagina 181 - Common Errors in SSL Setup

9-31Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsKeeping the Intrusion Log Current by Resetting Alert Fla

Pagina 182

9-32Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsFigure 9-14. Example of Port Status Screen with Intrusio

Pagina 183 - (802.1X)

9-33Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert Flags(The intrusion log holds up to 20 intrusion records and

Pagina 184

9-34Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsCLI: Checking for Intrusions, Listing Intrusion Alerts,

Pagina 185

9-35Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsFigure 9-17. Example of the Intrusion Log with Multiple

Pagina 186

9-36Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsUsing the Event Log To Find Intrusion AlertsThe Event Lo

Pagina 187

9-37Configuring and Monitoring Port SecurityOperating Notes for Port Securitya. Click on the Security tab.b. Click on [Intrusion Log]. “Ports with Int

Pagina 188 - How 802.1X Operates

9-38Configuring and Monitoring Port SecurityOperating Notes for Port SecurityLACP Not Available on Ports Configured for Port Security. To main-tain s

Pagina 189

10-110Traffic/Security Filters(ProCurve Series 2600/2600-PWR and 2800 Switches)ContentsContents . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 190

2-12Configuring Username and Password SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 191 - 802.1X standard

10-2Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)OverviewOverviewThis chapter describes the use of source-port filters o

Pagina 192

10-3Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Overviewfrom receiving traffic from workstation "X", you woul

Pagina 193 - Note on 802.1X

10-4Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersUsing Source-Port FiltersThis feature is avail

Pagina 194 - Access Control (802.1X)

10-5Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersConfiguring a Source-Port FilterThe source-por

Pagina 195

10-6Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersConfiguring a Filter on a Port Trunk. This op

Pagina 196

10-7Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersViewing a Source-Port FilterYou can list all s

Pagina 197 - Authenticators

10-8Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersIf you wanted to determine the index number fo

Pagina 198

10-9Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersEditing a Source-Port FilterThe switch include

Pagina 199

10-10Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersUsing Named Source-Port FiltersThis feature i

Pagina 200

10-11Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersA named source-port filter must first be defi

Pagina 201

2-2Configuring Username and Password SecurityOverviewOverviewConsole access includes both the menu interface and the CLI. There are two levels of cons

Pagina 202

10-12Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersViewing a Named Source-Port FilterYou can lis

Pagina 203 - 802.1X Open VLAN Mode

10-13Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersDefining and Configuring Example Named Source

Pagina 204

10-14Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersProCurve(config)# show filter Traffic/Securit

Pagina 205

10-15Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersUsing the IDX value in the show filter comman

Pagina 206

10-16Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersThe same command, using IDX 26, shows how tra

Pagina 207 - Unauthorized-Client VLANs

10-17Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port FiltersThe following revisions to the named source-p

Pagina 208

10-18Traffic/Security Filters (ProCurve Series 2600/2600-PWR and 2800 Switches)Using Source-Port Filters— This page is intentionally unused. —

Pagina 209

11-111Using Authorized IP Managers ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 210

11-2Using Authorized IP ManagersOverviewOverviewAuthorized IP Manager Features The Authorized IP Managers feature uses IP addresses and masks to deter

Pagina 211

11-3Using Authorized IP ManagersAccess LevelsConfiguration OptionsYou can configure: Up to 10 authorized manager addresses, where each address applie

Pagina 212

2-3Configuring Username and Password SecurityOverviewTo configure password security:1. Set a Manager password pair (and an Operator password pair, if

Pagina 213

11-4Using Authorized IP ManagersDefining Authorized Management StationsDefining Authorized Management Stations Authorizing Single Stations: The table

Pagina 214 - 802.1X Devices

11-5Using Authorized IP ManagersDefining Authorized Management Stations255.255.255.252 uses the 4th octet of a given Authorized Manager IP address to

Pagina 215 - 802.1X Device

11-6Using Authorized IP ManagersDefining Authorized Management StationsFigure 11-2. Example of How To Add an Authorized Manager Entry (Continued)Editi

Pagina 216 - Other Switches

11-7Using Authorized IP ManagersDefining Authorized Management StationsFigure 11-3. Example of the Show IP Authorized-Manager DisplayThe above example

Pagina 217

11-8Using Authorized IP ManagersDefining Authorized Management StationsSimilarly, the next command authorizes manager-level access for any station hav

Pagina 218

11-9Using Authorized IP ManagersWeb: Configuring IP Authorized ManagersWeb: Configuring IP Authorized ManagersIn the web browser interface you can con

Pagina 219

11-10Using Authorized IP ManagersBuilding IP MasksConfiguring Multiple Stations Per Authorized Manager IP EntryThe mask determines whether the IP addr

Pagina 220 - Statistics, and Counters

11-11Using Authorized IP ManagersBuilding IP MasksFigure 11-6. Example of How the Bitmap in the IP Mask Defines Authorized Manager AddressesAdditional

Pagina 221

11-12Using Authorized IP ManagersOperating NotesOperating Notes Network Security Precautions: You can enhance your network’s security by keeping phys

Pagina 222

Index – 1IndexNumerics3DES … 6-3, 7-3802.1XSee port-based access control. …8-1Aaaa authentication … 4-8aaa port-accessSee Web or MAC Authentication.ac

Pagina 223

ProCurveSwitch 2600 SeriesSwitch 2600-PWR SeriesSwitch 2800 SeriesSwitch 4100gl SeriesSwitch 6108Access Security GuideDecember 2008

Pagina 224

2-4Configuring Username and Password SecurityConfiguring Local Password SecurityConfiguring Local Password SecurityMenu: Setting PasswordsAs noted ear

Pagina 225 - ■ The switch reboots

2 – IndexIinconsistent value, message … 9-14intrusion alarmsentries dropped from log … 9-37event log … 9-36prior to … 9-37Intrusion Logprior to … 9-33

Pagina 226 - Affects VLAN Operation

Index – 3prior to … 9-37proxy web server … 9-37port-based access controlauthenticate switch … 8-4authenticate users … 8-4authenticator backend state …

Pagina 227

4 – Indexaccounting, system … 5-18, 5-22authentication options … 5-2authentication, local … 5-16authorized IP managers, precedence … 11-2bypass RADIUS

Pagina 228

Index – 5zeroing a key … 6-11zeroize … 6-11SSLCA-signed … 7-4, 7-15CA-signed certificate … 7-4, 7-15CLI commands … 7-7client behavior … 7-17, 7-18cryp

Pagina 229 - After the 802.1X session

6 – IndexSee also LACP.Uuser namecleared … 2-5Vvalue, inconsistent … 9-14VLAN802.1X … 8-44802.1X, ID changes … 8-47802.1X, suspend untagged VLAN … 8-4

Pagina 230

— This page is intentionally unused. —

Pagina 231

© 2000 - 2008 Hewlett-Packard Development Company, LP. The information contained herein is subject to change without notice.December 2008Manual Part N

Pagina 232

2-5Configuring Username and Password SecurityConfiguring Local Password SecurityIf you have physical access to the switch, press and hold the Clear bu

Pagina 233 - Blocking Unauthorized Traffic

2-6Configuring Username and Password SecurityConfiguring Local Password SecurityTo Remove Password Protection. Removing password protection means to

Pagina 234 - Trunk Group Exclusion

2-7Configuring Username and Password SecurityFront-Panel SecurityFront-Panel SecurityThe front-panel security features provide the ability to independ

Pagina 235 - Planning Port Security

2-8Configuring Username and Password SecurityFront-Panel SecurityAs a result of increased security concerns, customers now have the ability to stop so

Pagina 236

2-9Configuring Username and Password SecurityFront-Panel SecurityReset ButtonPressing the Reset button alone for one second causes the switch to reboo

Pagina 237

2-10Configuring Username and Password SecurityFront-Panel Security3. Release the Reset button and wait for about one second for the Self-Test LED to s

Pagina 238

2-11Configuring Username and Password SecurityFront-Panel Security• Modify the operation of the Reset+Clear combination (page 2-9) so that the switch

Pagina 239

2-12Configuring Username and Password SecurityFront-Panel SecurityFor example, show front-panel-security produces the following output when the switch

Pagina 240 - Learned MAC Addresses

2-13Configuring Username and Password SecurityFront-Panel SecurityRe-Enabling the Clear Button on the Switch’s Front Panel andSetting or Changing the

Pagina 241

Hewlett-Packard Company8000 Foothills Boulevard, m/s 5551Roseville, California 95747-5551http://www.procurve.com© Copyright 2001-2008 Hewlett-Packard

Pagina 242 - Configuring Port Security

2-14Configuring Username and Password SecurityFront-Panel SecurityFigure 2-9. Example of Re-Enabling the Clear Button’s Default OperationChanging the

Pagina 243

2-15Configuring Username and Password SecurityFront-Panel SecurityFigure 2-10. Example of Disabling the Factory Reset OptionPassword RecoveryThe passw

Pagina 244

2-16Configuring Username and Password SecurityFront-Panel SecuritySteps for Disabling Password-Recovery. 1. Set the CLI to the global interface conte

Pagina 245

2-17Configuring Username and Password SecurityFront-Panel SecurityFigure 2-11. Example of the Steps for Disabling Password-RecoveryPassword Recovery P

Pagina 246

2-18Configuring Username and Password SecurityFront-Panel Security— This page is intentionally unused. —

Pagina 247 - MAC Lockdown

3-13Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 248

3-2Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesOverviewOverviewApplicable Switch Models. Web and MAC Authentication are

Pagina 249

3-3Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesOverviewMAC Authentication (MAC-Auth). This method grants access to a sec

Pagina 250 - MAC Lockdown Operating Notes

3-4Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesOverviewGeneral FeaturesWeb and MAC Authentication on the ProCurve Series

Pagina 251 - Deploying MAC Lockdown

3-5Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesHow Web and MAC Authentication OperateHow Web and MAC Authentication Opera

Pagina 252

iiiContentsProduct DocumentationAbout Your Switch Manual Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiFeature Index

Pagina 253

3-6Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesHow Web and MAC Authentication OperateFigure 3-2. Progress Message During

Pagina 254

3-7Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesHow Web and MAC Authentication Operatemoves have not been enabled (client-

Pagina 255 - MAC Lockout

3-8Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesHow Web and MAC Authentication Operate4. If neither 1, 2, or 3, above, app

Pagina 256

3-9Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesTerminologyTerminologyAuthorized-Client VLAN: Like the Unauthorized-Client

Pagina 257 - Port Security and MAC Lockout

3-10Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesOperating Rules and NotesOperating Rules and Notes You can configure one

Pagina 258 - IP Lockdown

3-11Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesOperating Rules and Notes2. If there is no RADIUS-assigned VLAN, then, fo

Pagina 259 - Alert Flags

3-12Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesGeneral Setup Procedure for Web/MAC AuthenticationNote on Web/MAC Authent

Pagina 260

3-13Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesGeneral Setup Procedure for Web/MAC Authenticationa. If you configure the

Pagina 261 - Resetting Alert Flags

3-14Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesGeneral Setup Procedure for Web/MAC AuthenticationAdditional Information

Pagina 262

3-15Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring the Switch To Access a RADIUS ServerConfiguring the Switch To

Pagina 263 - Yes” for the port on which

ivFront-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7When Security Is Important . . .

Pagina 264

3-16Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring the Switch To Access a RADIUS ServerFor example, to configure

Pagina 265

3-17Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring Web AuthenticationConfiguring Web AuthenticationThis feature

Pagina 266 - [Overview] button

3-18Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring Web AuthenticationConfigure the Switch for Web-Based Authenti

Pagina 267 - [?] in the web

3-19Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring Web AuthenticationSyntax: [no] aaa port-access web-based [e]

Pagina 268

3-20Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring Web AuthenticationSyntax:aaa port-access web-based [e] < p

Pagina 269 - Traffic/Security Filters

3-21Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring Web AuthenticationSyntax: aaa port-access web-based [e] <

Pagina 270

3-22Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring MAC Authentication on the SwitchConfiguring MAC Authenticatio

Pagina 271

3-23Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring MAC Authentication on the SwitchConfigure the Switch for MAC-

Pagina 272 - Using Source-Port Filters

3-24Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-b

Pagina 273

3-25Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-b

Pagina 274

v4 TACACS+ AuthenticationContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1Ov

Pagina 275 - Viewing a Source-Port Filter

3-26Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesShow Status and Configuration of Web-Based AuthenticationShow Status and

Pagina 276 - Filter Indexing

3-27Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesShow Status and Configuration of MAC-Based AuthenticationShow Status and

Pagina 277 - Editing a Source-Port Filter

3-28Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesShow Status and Configuration of MAC-Based AuthenticationSyntax: show por

Pagina 278

3-29Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesShow Client StatusShow Client StatusThe table below shows the possible cl

Pagina 279

3-30Web and MAC Authentication for the Series 2600/2600-PWR and 2800 SwitchesShow Client Status— This page is intentionally unused. —

Pagina 280

4-14TACACS+ AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 281

4-2TACACS+ AuthenticationConfiguring TACACS+ on the SwitchOverviewTACACS+ authentication enables you to use a central server to allow or deny access t

Pagina 282

4-3TACACS+ AuthenticationConfiguring TACACS+ on the Switchtion services. If the switch fails to connect to any TACACS+ server, it defaults to its own

Pagina 283

4-4TACACS+ AuthenticationConfiguring TACACS+ on the Switch• Local Authentication: This method uses username/password pairs configured locally on the s

Pagina 284

4-5TACACS+ AuthenticationConfiguring TACACS+ on the SwitchGeneral System RequirementsTo use TACACS+ authentication, you need the following: A TACACS+

Pagina 285

vi1. Configure Authentication for the Access Methods You Want RADIUS To Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 286

4-6TACACS+ AuthenticationConfiguring TACACS+ on the Switchother access type (console, in this case) open in case the Telnet access fails due to a conf

Pagina 287 - Using Authorized IP Managers

4-7TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Privilege LevelsWhen a TACACS+ server authenticates an access request from a switch,

Pagina 288

4-8TACACS+ AuthenticationConfiguring TACACS+ on the Switchconfiguration in your TACACS+ server application for mis-configura-tions or missing data tha

Pagina 289 - Access Levels

4-9TACACS+ AuthenticationConfiguring TACACS+ on the SwitchCLI Commands Described in this SectionViewing the Switch’s Current Authentication Configurat

Pagina 290 - Stations

4-10TACACS+ AuthenticationConfiguring TACACS+ on the SwitchViewing the Switch’s Current TACACS+ Server Contact ConfigurationThis command lists the tim

Pagina 291 - Managers

4-11TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s Authentication MethodsThe aaa authentication command configures th

Pagina 292

4-12TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-1. AAA Authentication ParametersAs shown in the next table, login and enable access

Pagina 293

4-13TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-2. Primary/Secondary Authentication TableCaution Regarding the Use of Local for Log

Pagina 294

4-14TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, here is a set of access options and the corresponding commands to configure th

Pagina 295 - Building IP Masks

4-15TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s TACACS+ Server AccessThe tacacs-server command configures these pa

Pagina 296 - IP Entry

vii6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 6-21Further Information on SSH Client Public-Key Authenticatio

Pagina 297

4-16TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Encryption KeysEncryption keys configured in the switch must exactly match the encr

Pagina 298 - Operating Notes

4-17TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-3. Details on Configuring TACACS Servers and KeysName Default Rangetacacs-server

Pagina 299 - Index – 1

4-18TACACS+ AuthenticationConfiguring TACACS+ on the SwitchAdding, Removing, or Changing the Priority of a TACACS+ Server. Suppose that the switch was

Pagina 300 - 2 – Index

4-19TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFigure 4-5. Example of the Switch After Assigning a Different “First-Choice” ServerTo remov

Pagina 301 - Index – 3

4-20TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTo delete a per-server encryption key in the switch, re-enter the tacacs-server host comman

Pagina 302 - 4 – Index

4-21TACACS+ AuthenticationConfiguring TACACS+ on the SwitchUsing figure 4-6, above, after either switch detects an operator’s logon request from a rem

Pagina 303 - Index – 5

4-22TACACS+ AuthenticationConfiguring TACACS+ on the SwitchLocal Authentication ProcessWhen the switch is configured to use TACACS+, it reverts to loc

Pagina 304 - 6 – Index

4-23TACACS+ AuthenticationConfiguring TACACS+ on the SwitchUsing the Encryption KeyGeneral OperationWhen used, the encryption key (sometimes termed “k

Pagina 305

4-24TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, you would use the next command to configure a global encryp-tion key in the sw

Pagina 306

4-25TACACS+ AuthenticationConfiguring TACACS+ on the SwitchMessages Related to TACACS+ OperationThe switch generates the CLI messages listed below. Ho

Commenti su questo manuale

Nessun commento