Sign In
Upload
Manuals
Brands
HP Manuals
Switch
ProCurve 2510-48
HP ProCurve 2510-48 Manuals
Manuals and User Guides for HP ProCurve 2510-48. We have
4
HP ProCurve 2510-48 manuals available for free PDF download: Management And Configuration Manual, Manual, Access Security Manual, Specification
HP ProCurve 2510-48 Manual (318 pages)
ProCurve 2510 Series Switches
Brand:
HP
| Category:
Switch
| Size: 1.44 MB
Table of Contents
Table of Contents
5
Product Documentation
13
About Your Switch Manual Set
13
Feature Index
14
Getting Started
18
Introduction
18
Overview of Access Security Features
18
Management Access Security Protection
19
General Switch Traffic Security Guidelines
20
Conventions
21
Command Syntax Statements
21
Command Prompts
22
Screen Simulations
22
Port Identity Examples
22
Sources for more Information
23
Need Only a Quick Start
24
IP Addressing
24
To Set up and Install the Switch in Your Network
25
Configuring Username and Password Security
28
Overview
28
Configuring Local Password Security
30
Menu: Setting Passwords
30
CLI: Setting Passwords and Usernames
31
Web: Setting Passwords and Usernames
32
Front-Panel Security
33
When Security Is Important
33
Front-Panel Button Functions
34
Configuring Front-Panel Security
36
Password Recovery
41
Password Recovery Process
43
Web and MAC Authentication
45
Contents
45
Overview
46
Client Options
47
General Features
48
How Web and MAC Authentication Operate
49
Authenticator Operation
49
Terminology
53
Operating Rules and Notes
54
General Setup Procedure for Web/Mac Authentication
56
Do These Steps before You Configure Web/Mac Authentication
56
Additional Information for Configuring the RADIUS Server to Support MAC Authentication
58
Configuring the Switch to Access a RADIUS Server
59
Configuring Web Authentication
61
Overview
61
Configure the Switch for Web-Based Authentication
62
Configuring MAC Authentication on the Switch
66
Overview
66
Configure the Switch for MAC-Based Authentication
67
Show Status and Configuration of Web-Based Authentication
70
Show Status and Configuration of MAC-Based Authentication
72
Show Client Status
74
TACACS+ Authentication
75
Contents
75
Overview
76
Terminology Used in TACACS+ Applications
77
General System Requirements
79
General Authentication Setup Procedure
79
Configuring TACACS+ on the Switch
82
Before You Begin
82
CLI Commands Described in this Section
83
Viewing the Switch's Current Authentication Configuration
83
Viewing the Switch's Current TACACS+ Server Contact Configuration
84
Configuring the Switch's TACACS+ Authentication Methods
85
Configuring the Switch's TACACS+ Server Access
92
How Authentication Operates
97
General Authentication Process Using a TACACS+ Server
97
Local Authentication Process
99
Using the Encryption Key
100
Controlling Web Browser Interface Access When Using TACACS+ Authentication
101
Controlling Web Browser Interface Access When Using TACACS
101
Authentication
101
Messages Related to TACACS+ Operation
102
Operating Notes
102
RADIUS Authentication, Authorization and Accounting
105
Contents
105
Overview
106
Terminology
107
Switch Operating Rules for RADIUS
108
General RADIUS Setup Procedure
109
Configuring the Switch for RADIUS Authentication
110
Outline of the Steps for Configuring RADIUS Authentication
111
Configure Authentication for the Access Methods You Want RADIUS to Protect
112
Configure the Switch to Access a RADIUS Server
114
Configure the Switch's Global RADIUS Parameters
116
Local Authentication Process
120
Controlling Web Browser Interface Access When Using RADIUS Authentication
121
Commands Authorization
121
Controlling Web Browser Interface Access When Using RADIUS
121
Enabling Authorization
122
Configuring Commands Authorization on a RADIUS Server
123
Displaying Authorization Information
123
Example Configuration on Cisco Secure Acs for Ms Windows
125
Example Configuration Using Freeradius
128
Configuring RADIUS Accounting
129
Operating Rules for RADIUS Accounting
130
Steps for Configuring RADIUS Accounting
131
Reports to the Radius Server
133
Updating Options
135
Viewing RADIUS Statistics
136
General RADIUS Statistics
136
RADIUS Authentication Statistics
139
RADIUS Accounting Statistics
140
Changing RADIUS-Server Access Order
141
Messages Related to RADIUS Operation
143
Configuring Secure Shell (SSH)
145
Contents
145
Overview
146
Terminology
148
Prerequisite for Using SSH
149
Public Key Formats
149
Steps for Configuring and Using SSH for Switch and Client Authentication
149
General Operating Rules and Notes
152
Assign Local Login (Operator) and Enable (Manager) Password
153
Configuring the Switch for SSH Operation
153
Generate the Switch's Public and Private Key Pair
154
Provide the Switch's Public Key to Clients
156
Enable SSH on the Switch and Anticipate SSH Client Contact Behavior
159
Configure the Switch for SSH Authentication
162
Use an SSH Client to Access the Switch
166
Further Information on SSH Client Public-Key Authentication
166
Messages Related to SSH Operation
172
Configuring Secure Socket Layer (SSL)
175
Contents
175
Overview
176
Terminology
177
Prerequisite for Using SSL
179
Steps for Configuring and Using SSL for Switch and Client Authentication
179
General Operating Rules and Notes
180
Assign Local Login (Operator) and Enable (Manager) Password
181
Generate the Switch's Server Host Certificate
182
Enable SSL on the Switch and Anticipate SSL Browser Contact Behavior
191
Common Errors in SSL Setup
195
Configuring Port-Based and Client-Based Access Control (802.1X)
197
Contents
197
Overview
199
Why Use Port-Based or Client-Based Access Control
199
General Features
199
User Authentication Methods
200
Terminology
203
General 802.1X Authenticator Operation
206
Example of the Authentication Process
206
Switch-Port Supplicant Operation
207
General Operating Rules and Notes
208
General Setup Procedure for 802.1X Access Control
210
Do These Steps before You Configure 802.1X Operation
210
Overview: Configuring 802.1X Authentication on the Switch
211
Configuring Switch Ports as 802.1X Authenticators
213
Enable 802.1X Authentication on Selected Ports
213
Reconfigure Settings for Port-Access
216
Configure the 802.1X Authentication Method
219
Enter the RADIUS Host IP Address(Es)
220
Enable 802.1X Authentication on the Switch
220
Optionally Resetting Authenticator Operation
221
802.1X Open VLAN Mode
222
Introduction
222
VLAN Membership Priorities
223
Use Models for 802.1X Open VLAN Modes
224
Operating Rules for Authorized-Client and Unauthorized-Client Vlans
227
Setting up and Configuring 802.1X Open VLAN Mode
230
802.1X Open VLAN Operating Notes
234
Option for Authenticator Ports: Configure Port-Security to Allow Only 802.1X Devices
236
Option for Authenticator Ports: Configure Port-Security to Allow
236
Only 802.1X Devices
236
Configuring Switch Ports to Operate as Supplicants for 802.1X Connections to Other Switches
238
Displaying 802.1X Configuration, Statistics, and Counters
243
Show Commands for Port-Access Authenticator
243
Viewing 802.1X Open VLAN Mode Status
246
Show Commands for Port-Access Supplicant
249
How RADIUS/802.1X Authentication Affects VLAN Operation
250
Messages Related to 802.1X Operation
254
Configuring and Monitoring Port Security
255
Contents
255
Overview
256
Basic Operation
256
Blocking Unauthorized Traffic
257
Trunk Group Exclusion
258
Planning Port Security
259
Port Security Command Options and Operation
260
Retention of Static MAC Addresses
264
Displaying Current Port Security Settings
264
Configuring Port Security
266
MAC Lockdown
272
Differences between MAC Lockdown and Port Security
273
Deploying MAC Lockdown
275
MAC Lockout
279
Port Security and MAC Lockout
281
Web: Displaying and Configuring Port Security Features
282
Reading Intrusion Alerts and Resetting Alert Flags
282
Notice of Security Violations
282
How the Intrusion Log Operates
283
Keeping the Intrusion Log Current by Resetting Alert Flags
284
Using the Event Log to Find Intrusion Alerts
289
Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags
290
Operating Notes for Port Security
290
Configuring Protected Ports
292
Using Authorized IP Managers
296
Overview
296
Configuration Options
297
Access Levels
297
Defining Authorized Management Stations
298
Overview of IP Mask Operation
298
Menu: Viewing and Configuring IP Authorized Managers
299
CLI: Viewing and Configuring Authorized IP Managers
300
Configuring Ip Authorized Managers for the Switch
301
Web: Configuring IP Authorized Managers
303
Building IP Masks
303
Configuring One Station Per Authorized Manager IP Entry
303
Configuring Multiple Stations Per Authorized Manager IP Entry
304
Additional Examples for Authorizing Multiple Stations
306
Operating Notes
306
Index
309
Advertisement
HP ProCurve 2510-48 Access Security Manual (294 pages)
ProCurve 2510 Series
Brand:
HP
| Category:
Switch
| Size: 1.96 MB
Table of Contents
Access Security Guide
3
Table of Contents
5
Product Documentation
13
About Your Switch Manual Set
13
Feature Index
14
Getting Started
18
Introduction
18
Overview of Access Security Features
18
Management Access Security Protection
19
General Switch Traffic Security Guidelines
20
Conventions
21
Command Syntax Statements
21
Command Prompts
22
Screen Simulations
22
Port Identity Examples
22
Sources for more Information
23
Need Only a Quick Start
24
IP Addressing
24
To Set up and Install the Switch in Your Network
25
Contents
27
Configuring Username and Password Security
28
Overview
28
Configuring Local Password Security
30
Menu: Setting Passwords
30
CLI: Setting Passwords and Usernames
31
Web: Setting Passwords and Usernames
32
Front-Panel Security
33
When Security Is Important
33
Front-Panel Button Functions
34
Configuring Front-Panel Security
36
Password Recovery
41
Password Recovery Process
43
Web and MAC Authentication
45
Contents
45
Overview
46
Client Options
47
General Features
48
How Web and MAC Authentication Operate
49
Authenticator Operation
49
Terminology
53
Operating Rules and Notes
54
General Setup Procedure for Web/Mac Authentication
56
Do These Steps before You Configure Web/Mac Authentication
56
Additional Information for Configuring the RADIUS Server to Support MAC Authentication
58
Configuring the Switch to Access a RADIUS Server
59
Configuring Web Authentication
61
Overview
61
Configure the Switch for Web-Based Authentication
62
Configuring MAC Authentication on the Switch
66
Overview
66
Configure the Switch for MAC-Based Authentication
67
Show Status and Configuration of Web-Based Authentication
70
Show Status and Configuration of MAC-Based Authentication
72
Show Client Status
74
TACACS+ Authentication
75
Contents
75
Overview
76
Terminology Used in TACACS Applications
77
General System Requirements
79
General Authentication Setup Procedure
79
Configuring TACACS+ on the Switch
82
Before You Begin
82
CLI Commands Described in this Section
83
Viewing the Switch's Current Authentication Configuration
83
Viewing the Switch's Current TACACS+ Server Contact Configuration
84
Configuring the Switch's Authentication Methods
85
Configuring the Switch's TACACS+ Server Access
89
How Authentication Operates
94
General Authentication Process Using a TACACS+ Server
94
Local Authentication Process
96
Using the Encryption Key
97
Controlling Web Browser Interface Access When Using TACACS+ Authentication
98
Controlling Web Browser Interface Access When Using TACACS
98
Authentication
98
Messages Related to TACACS+ Operation
99
Operating Notes
99
RADIUS Authentication and Accounting
101
Contents
101
Overview
102
Terminology
103
Switch Operating Rules for RADIUS
104
General RADIUS Setup Procedure
105
Configuring the Switch for RADIUS Authentication
106
Outline of the Steps for Configuring RADIUS Authentication
107
Configure Authentication for the Access Methods You Want RADIUS to Protect
108
Configure the Switch to Access a RADIUS Server
110
Configure the Switch's Global RADIUS Parameters
112
Local Authentication Process
116
Controlling Web Browser Interface Access When Using RADIUS Authentication
117
Configuring RADIUS Accounting
117
Operating Rules for RADIUS Accounting
119
Steps for Configuring RADIUS Accounting
119
Configuring RADIUS Accounting
119
Reports to the Radius Server
122
Viewing RADIUS Statistics
125
General RADIUS Statistics
125
RADIUS Authentication Statistics
128
RADIUS Accounting Statistics
129
Changing RADIUS-Server Access Order
130
Messages Related to RADIUS Operation
132
Configuring Secure Shell (SSH)
133
Contents
133
Overview
134
Terminology
136
Prerequisite for Using SSH
137
Public Key Formats
137
Steps for Configuring and Using SSH for Switch and Client Authentication
138
General Operating Rules and Notes
140
Configuring the Switch for SSH Operation
141
Assign Local Login (Operator) and Enable (Manager) Password
141
Generate the Switch's Public and Private Key Pair
142
Provide the Switch's Public Key to Clients
144
Enable SSH on the Switch and Anticipate SSH Client Contact Behavior
147
Configure the Switch for SSH Authentication
150
Use an SSH Client to Access the Switch
154
Further Information on SSH Client Public-Key Authentication
155
Messages Related to SSH Operation
161
Configuring Secure Socket Layer (SSL)
163
Contents
163
Overview
164
Terminology
165
Prerequisite for Using SSL
167
Steps for Configuring and Using SSL for Switch and Client Authentication
167
General Operating Rules and Notes
168
Assign Local Login (Operator) and Enable (Manager) Password
169
Generate the Switch's Server Host Certificate
170
Enable SSL on the Switch and Anticipate SSL Browser Contact Behavior
179
Common Errors in SSL Setup
183
Configuring Port-Based and Client-Based Access Control (802.1X)
185
Contents
185
Overview
187
Why Use Port-Based or Client-Based Access Control
187
General Features
187
User Authentication Methods
188
Terminology
191
General 802.1X Authenticator Operation
194
Example of the Authentication Process
194
Switch-Port Supplicant Operation
195
General Operating Rules and Notes
196
General Setup Procedure for 802.1X Access Control
198
Do These Steps before You Configure 802.1X Operation
198
Overview: Configuring 802.1X Authentication on the Switch
199
Enable 802.1X Authentication on Selected Ports
201
Configuring Switch Ports as 802.1X Authenticators
201
Reconfigure Settings for Port-Access
204
Configure the 802.1X Authentication Method
207
Enter the RADIUS Host IP Address(Es)
208
Enable 802.1X Authentication on the Switch
208
Optionally Resetting Authenticator Operation
209
802.1X Open VLAN Mode
210
Introduction
210
VLAN Membership Priorities
211
Use Models for 802.1X Open VLAN Modes
212
Operating Rules for Authorized-Client and Unauthorized-Client Vlans
215
Setting up and Configuring 802.1X Open VLAN Mode
218
802.1X Open VLAN Operating Notes
222
Option for Authenticator Ports: Configure Port-Security to Allow Only 802.1X Devices
224
Option for Authenticator Ports: Configure Port-Security to Allow
224
Only 802.1X Devices
224
Configuring Switch Ports to Operate as Supplicants for 802.1X Connections to Other Switches
226
Displaying 802.1X Configuration, Statistics, and Counters
231
Show Commands for Port-Access Authenticator
231
Viewing 802.1X Open VLAN Mode Status
234
Show Commands for Port-Access Supplicant
237
How RADIUS/802.1X Authentication Affects VLAN Operation
238
Messages Related to 802.1X Operation
242
Contents
243
Configuring and Monitoring Port Security
244
Overview
244
Basic Operation
244
Blocking Unauthorized Traffic
245
Trunk Group Exclusion
246
Planning Port Security
247
Port Security Command Options and Operation
248
Retention of Static MAC Addresses
252
Displaying Current Port Security Settings
252
Configuring Port Security
254
Web: Displaying and Configuring Port Security Features
259
Reading Intrusion Alerts and Resetting Alert Flags
259
Notice of Security Violations
259
How the Intrusion Log Operates
260
Keeping the Intrusion Log Current by Resetting Alert Flags
261
Using the Event Log to Find Intrusion Alerts
266
Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags
267
Operating Notes for Port Security
267
Configuring Protected Ports
269
Configuring Multiple Stations Per Authorized Manager IP Entry
271
Additional Examples for Authorizing Multiple Stations
271
Using Authorized IP Managers
272
Overview
272
Configuration Options
273
Access Levels
273
Defining Authorized Management Stations
274
Overview of IP Mask Operation
274
Menu: Viewing and Configuring IP Authorized Managers
275
CLI: Viewing and Configuring Authorized IP Managers
276
Configuring Ip Authorized Managers for the Switch
277
Web: Configuring IP Authorized Managers
279
Building IP Masks
279
Configuring One Station Per Authorized Manager IP Entry
279
Configuring Multiple Stations Per Authorized Manager IP Entry
280
Additional Examples for Authorizing Multiple Stations
282
Operating Notes
282
HP ProCurve 2510-48 Management And Configuration Manual (412 pages)
Brand:
HP
| Category:
Switch
| Size: 3 MB
Table of Contents
Table of Contents
314
Port and Static Trunk Monitoring Features
335
Menu: Configuring Port and Static Trunk Monitoring
336
CLI: Configuring Port and Static Trunk Monitoring
338
Monitoring Limitations
338
Web: Configuring Port Monitoring
340
Locating a Device
341
Overview
345
Troubleshooting Approaches
345
Chassis Over-Temperature Detection
347
Browser or Telnet Access Problems
349
Unusual Network Activity
351
General Problems
351
Prioritization Problems
352
IGMP-Related Problems
352
LACP-Related Problems
353
Port-Based Access Control (802.1X)-Related Problems
354
Radius-Related Problems
357
Spanning-Tree Protocol (STP) and Fast-Uplink Problems
358
SSH-Related Problems
359
Stacking-Related Problems
360
TACACS-Related Problems
360
Timep, SNTP, or Gateway Problems
362
VLAN-Related Problems
362
Using Logging to Identify Problem Sources
365
Event Log Operation
365
Menu: Entering and Navigating in the Event Log
367
Cli
368
Debug and Syslog Operation
369
Diagnostic Tools
376
Port Auto-Negotiation
376
Ping and Link Tests
377
Web: Executing Ping or Link Tests
378
CLI: Ping or Link Tests
379
Displaying the Configuration File
381
CLI: Viewing the Configuration File
381
Web: Viewing the Configuration File
381
Listing Switch Configuration and Operation Details for Help in Troubleshooting
382
CLI Administrative and Troubleshooting Commands
384
Restoring the Factory-Default Configuration
385
Using the CLI
385
Using the Clear/Reset Buttons
385
Restoring a Flash Image
386
Overview
390
Determining MAC Addresses in the Switch
390
Menu: Viewing the Switch's MAC Addresses
391
CLI: Viewing the Port and VLAN MAC Addresses
392
Viewing the MAC Addresses of Connected Devices
394
Advertisement
HP ProCurve 2510-48 Specification (31 pages)
2510 Switch Series
Brand:
HP
| Category:
Switch
| Size: 0.51 MB
Table of Contents
Key Features
1
Product Overview
1
Features and Benefits
1
Internal Power Supplies
6
Technical Specifications
8
Advertisement
Related Products
HP ProCurve 2510-24
HP ProCurve 2512
HP PROCURVE 2520
HP ProCurve 2520G-PoE
HP HP 2530
HP 2530-24G
HP 2530-48
HP 2530-8G
HP 2530-8G-PoE+
HP ProCurve 2520G
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL