Sign In
Upload
Manuals
Brands
HP Manuals
Switch
Q.11.XX
HP Q.11.XX Manuals
Manuals and User Guides for HP Q.11.XX. We have
1
HP Q.11.XX manual available for free PDF download: Manual
HP Q.11.XX Manual (318 pages)
ProCurve 2510 Series Switches
Brand:
HP
| Category:
Switch
| Size: 1.44 MB
Table of Contents
Table of Contents
5
Product Documentation
13
About Your Switch Manual Set
13
Feature Index
14
Getting Started
18
Introduction
18
Overview of Access Security Features
18
Management Access Security Protection
19
General Switch Traffic Security Guidelines
20
Conventions
21
Command Syntax Statements
21
Command Prompts
22
Screen Simulations
22
Port Identity Examples
22
Sources for more Information
23
Need Only a Quick Start
24
IP Addressing
24
To Set up and Install the Switch in Your Network
25
Configuring Username and Password Security
28
Overview
28
Configuring Local Password Security
30
Menu: Setting Passwords
30
CLI: Setting Passwords and Usernames
31
Web: Setting Passwords and Usernames
32
Front-Panel Security
33
When Security Is Important
33
Front-Panel Button Functions
34
Configuring Front-Panel Security
36
Password Recovery
41
Password Recovery Process
43
Web and MAC Authentication
45
Contents
45
Overview
46
Client Options
47
General Features
48
How Web and MAC Authentication Operate
49
Authenticator Operation
49
Terminology
53
Operating Rules and Notes
54
General Setup Procedure for Web/Mac Authentication
56
Do These Steps before You Configure Web/Mac Authentication
56
Additional Information for Configuring the RADIUS Server to Support MAC Authentication
58
Configuring the Switch to Access a RADIUS Server
59
Configuring Web Authentication
61
Overview
61
Configure the Switch for Web-Based Authentication
62
Configuring MAC Authentication on the Switch
66
Overview
66
Configure the Switch for MAC-Based Authentication
67
Show Status and Configuration of Web-Based Authentication
70
Show Status and Configuration of MAC-Based Authentication
72
Show Client Status
74
TACACS+ Authentication
75
Contents
75
Overview
76
Terminology Used in TACACS+ Applications
77
General System Requirements
79
General Authentication Setup Procedure
79
Configuring TACACS+ on the Switch
82
Before You Begin
82
CLI Commands Described in this Section
83
Viewing the Switch's Current Authentication Configuration
83
Viewing the Switch's Current TACACS+ Server Contact Configuration
84
Configuring the Switch's TACACS+ Authentication Methods
85
Configuring the Switch's TACACS+ Server Access
92
How Authentication Operates
97
General Authentication Process Using a TACACS+ Server
97
Local Authentication Process
99
Using the Encryption Key
100
Controlling Web Browser Interface Access When Using TACACS+ Authentication
101
Controlling Web Browser Interface Access When Using TACACS
101
Authentication
101
Messages Related to TACACS+ Operation
102
Operating Notes
102
RADIUS Authentication, Authorization and Accounting
105
Contents
105
Overview
106
Terminology
107
Switch Operating Rules for RADIUS
108
General RADIUS Setup Procedure
109
Configuring the Switch for RADIUS Authentication
110
Outline of the Steps for Configuring RADIUS Authentication
111
Configure Authentication for the Access Methods You Want RADIUS to Protect
112
Configure the Switch to Access a RADIUS Server
114
Configure the Switch's Global RADIUS Parameters
116
Local Authentication Process
120
Controlling Web Browser Interface Access When Using RADIUS Authentication
121
Commands Authorization
121
Controlling Web Browser Interface Access When Using RADIUS
121
Enabling Authorization
122
Configuring Commands Authorization on a RADIUS Server
123
Displaying Authorization Information
123
Example Configuration on Cisco Secure Acs for Ms Windows
125
Example Configuration Using Freeradius
128
Configuring RADIUS Accounting
129
Operating Rules for RADIUS Accounting
130
Steps for Configuring RADIUS Accounting
131
Reports to the Radius Server
133
Updating Options
135
Viewing RADIUS Statistics
136
General RADIUS Statistics
136
RADIUS Authentication Statistics
139
RADIUS Accounting Statistics
140
Changing RADIUS-Server Access Order
141
Messages Related to RADIUS Operation
143
Configuring Secure Shell (SSH)
145
Contents
145
Overview
146
Terminology
148
Prerequisite for Using SSH
149
Public Key Formats
149
Steps for Configuring and Using SSH for Switch and Client Authentication
149
General Operating Rules and Notes
152
Assign Local Login (Operator) and Enable (Manager) Password
153
Configuring the Switch for SSH Operation
153
Generate the Switch's Public and Private Key Pair
154
Provide the Switch's Public Key to Clients
156
Enable SSH on the Switch and Anticipate SSH Client Contact Behavior
159
Configure the Switch for SSH Authentication
162
Use an SSH Client to Access the Switch
166
Further Information on SSH Client Public-Key Authentication
166
Messages Related to SSH Operation
172
Configuring Secure Socket Layer (SSL)
175
Contents
175
Overview
176
Terminology
177
Prerequisite for Using SSL
179
Steps for Configuring and Using SSL for Switch and Client Authentication
179
General Operating Rules and Notes
180
Assign Local Login (Operator) and Enable (Manager) Password
181
Generate the Switch's Server Host Certificate
182
Enable SSL on the Switch and Anticipate SSL Browser Contact Behavior
191
Common Errors in SSL Setup
195
Configuring Port-Based and Client-Based Access Control (802.1X)
197
Contents
197
Overview
199
Why Use Port-Based or Client-Based Access Control
199
General Features
199
User Authentication Methods
200
Terminology
203
General 802.1X Authenticator Operation
206
Example of the Authentication Process
206
Switch-Port Supplicant Operation
207
General Operating Rules and Notes
208
General Setup Procedure for 802.1X Access Control
210
Do These Steps before You Configure 802.1X Operation
210
Overview: Configuring 802.1X Authentication on the Switch
211
Configuring Switch Ports as 802.1X Authenticators
213
Enable 802.1X Authentication on Selected Ports
213
Reconfigure Settings for Port-Access
216
Configure the 802.1X Authentication Method
219
Enter the RADIUS Host IP Address(Es)
220
Enable 802.1X Authentication on the Switch
220
Optionally Resetting Authenticator Operation
221
802.1X Open VLAN Mode
222
Introduction
222
VLAN Membership Priorities
223
Use Models for 802.1X Open VLAN Modes
224
Operating Rules for Authorized-Client and Unauthorized-Client Vlans
227
Setting up and Configuring 802.1X Open VLAN Mode
230
802.1X Open VLAN Operating Notes
234
Option for Authenticator Ports: Configure Port-Security to Allow Only 802.1X Devices
236
Option for Authenticator Ports: Configure Port-Security to Allow
236
Only 802.1X Devices
236
Configuring Switch Ports to Operate as Supplicants for 802.1X Connections to Other Switches
238
Displaying 802.1X Configuration, Statistics, and Counters
243
Show Commands for Port-Access Authenticator
243
Viewing 802.1X Open VLAN Mode Status
246
Show Commands for Port-Access Supplicant
249
How RADIUS/802.1X Authentication Affects VLAN Operation
250
Messages Related to 802.1X Operation
254
Configuring and Monitoring Port Security
255
Contents
255
Overview
256
Basic Operation
256
Blocking Unauthorized Traffic
257
Trunk Group Exclusion
258
Planning Port Security
259
Port Security Command Options and Operation
260
Retention of Static MAC Addresses
264
Displaying Current Port Security Settings
264
Configuring Port Security
266
MAC Lockdown
272
Differences between MAC Lockdown and Port Security
273
Deploying MAC Lockdown
275
MAC Lockout
279
Port Security and MAC Lockout
281
Web: Displaying and Configuring Port Security Features
282
Reading Intrusion Alerts and Resetting Alert Flags
282
Notice of Security Violations
282
How the Intrusion Log Operates
283
Keeping the Intrusion Log Current by Resetting Alert Flags
284
Using the Event Log to Find Intrusion Alerts
289
Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags
290
Operating Notes for Port Security
290
Configuring Protected Ports
292
Using Authorized IP Managers
296
Overview
296
Configuration Options
297
Access Levels
297
Defining Authorized Management Stations
298
Overview of IP Mask Operation
298
Menu: Viewing and Configuring IP Authorized Managers
299
CLI: Viewing and Configuring Authorized IP Managers
300
Configuring Ip Authorized Managers for the Switch
301
Web: Configuring IP Authorized Managers
303
Building IP Masks
303
Configuring One Station Per Authorized Manager IP Entry
303
Configuring Multiple Stations Per Authorized Manager IP Entry
304
Additional Examples for Authorizing Multiple Stations
306
Operating Notes
306
Index
309
Advertisement
Advertisement
Related Products
HP Q.11. (2510-24)
HP Q1517A - StorageWorks Ultrium 230 Tape Drive
HP Q1864A
HP Q1866A
HP Q1994A
HP Q1989A
HP Q1990A
HP Q1785A
HP Q1787A
HP Q1595B - StorageWorks Ultrium 960 Tape Drive
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL