HP Q.11. (2510-24) Access Security Manual

Manufacturer
Type
Pages 294 Pages
Updated Sep 3, 2021
Category Switch

Table of Contents

  • Access security guide

    3
  • Contents

    5
  • Product documentation

    13
  • Contents

    17
  • Introduction

    18
  • Management Access Security Protection

    19
  • General Switch Traffic Security Guidelines

    20
  • Conventions

    21
  • Command Prompts

    22
  • Sources for More Information

    23
  • Need Only a Quick Start?

    24
  • To Set Up and Install the Switch in Your Network

    25
  • Configuring Username and Password Security

    27
  • Overview

    28
  • Configuring Local Password Security

    30
  • CLI: Setting Passwords and Usernames

    31
  • Web: Setting Passwords and Usernames

    32
  • Front-Panel Security

    33
  • Front-Panel Button Functions '

    34
  • Configuring Front-Panel Security

    36
  • Password Recovery

    41
  • Password Recovery Process

    43
  • Web and MAC Authentication

    45
  • Client Options

    47
  • General Features

    48
  • How Web and MAC Authentication Operate

    49
  • Terminology

    53
  • Operating Rules and Notes

    54
  • General Setup Procedure for Web/MAC Authentication

    56
  • Server To Support MAC Authentication

    58
  • Configuring the Switch To Access a RADIUS Server

    59
  • Configuring Web Authentication

    61
  • Configure the Switch for Web-Based Authentication

    62
  • Configuring MAC Authentication on the Switch

    66
  • Configure the Switch for MAC-Based Authentication

    67
  • Show Status and Configuration of Web-Based Authentication

    70
  • Show Status and Configuration of MAC-Based Authentication

    72
  • Show Client Status

    74
  • TACACS+ Authentication

    75
  • Terminology Used in TACACS Applications:

    77
  • General System Requirements

    79
  • Configuring TACACS+ on the Switch

    82
  • CLI Commands Described in this Section

    83
  • Contact Configuration

    84
  • Configuring the Switch's Authentication Methods

    85
  • Configuring the Switch's TACACS+ Server Access

    89
  • How Authentication Operates

    94
  • Local Authentication Process

    96
  • Using the Encryption Key

    97
  • Authentication

    98
  • Messages Related to TACACS+ Operation

    99
  • RADIUS Authentication and Accounting

    101
  • Switch Operating Rules for RADIUS

    104
  • General RADIUS Setup Procedure

    105
  • Configuring the Switch for RADIUS Authentication

    106
  • Outline of the Steps for Configuring RADIUS Authentication

    107
  • You Want RADIUS To Protect

    108
  • Configure the Switch To Access a RADIUS Server

    110
  • Configure the Switch's Global RADIUS Parameters

    112
  • Configuring RADIUS Accounting

    117
  • Operating Rules for RADIUS Accounting

    119
  • Reports to the radius server

    122
  • Viewing RADIUS Statistics

    125
  • RADIUS Authentication Statistics

    128
  • RADIUS Accounting Statistics

    129
  • Changing RADIUS-Server Access Order

    130
  • Messages Related to RADIUS Operation

    132
  • Configuring Secure Shell (SSH)

    133
  • Prerequisite for Using SSH

    137
  • For Switch and Client Authentication

    138
  • General Operating Rules and Notes

    140
  • Configuring the Switch for SSH Operation

    141
  • Generate the Switch's Public and Private Key Pair

    142
  • Provide the Switch's Public Key to Clients

    144
  • Client Contact Behavior

    147
  • Configure the Switch for SSH Authentication

    150
  • Use an SSH Client To Access the Switch

    154
  • Further Information on SSH Client Public-Key Authentication

    155
  • Messages Related to SSH Operation

    161
  • Prerequisite for Using SSL

    167
  • Assign Local Login (Operator) and Enable (Manager) Password

    169
  • Generate the Switch's Server Host Certificate

    170
  • Browser Contact Behavior

    179
  • Common Errors in SSL Setup

    183
  • Configuring Port-Based and Client-Based Access Control (802.1X)

    185
  • Why Use Port-Based or Client-Based Access Control?

    187
  • User Authentication Methods

    188
  • General 802.1X Authenticator Operation

    194
  • Switch-Port Supplicant Operation

    195
  • General Setup Procedure for 802.1X Access Control

    198
  • Overview: Configuring 802.1X Authentication on the Switch

    199
  • Configuring Switch Ports as 802.1X Authenticators

    201
  • Reconfigure Settings for Port-Access

    204
  • Configure the 802.1X Authentication Method

    207
  • Enter the RADIUS Host IP Address(es)

    208
  • Optionally Resetting Authenticator Operation

    209
  • X Open VLAN Mode

    210
  • VLAN Membership Priorities

    211
  • Use Models for 802.1X Open VLAN Modes

    212
  • Unauthorized-Client VLANs

    215
  • Setting Up and Configuring 802.1X Open VLAN Mode

    218
  • X Open VLAN Operating Notes

    222
  • Only 802.1X Devices

    224
  • Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches

    226
  • Displaying 802.1X Configuration, Statistics, and Counters

    231
  • Viewing 802.1X Open VLAN Mode Status

    234
  • Show Commands for Port-Access Supplicant

    237
  • How RADIUS/802.1X Authentication Affects VLAN Operation

    238
  • Messages Related to 802.1X Operation

    242
  • Configuring and Monitoring Port Security

    243
  • Basic Operation

    244
  • Blocking Unauthorized Traffic

    245
  • Trunk Group Exclusion

    246
  • Planning Port Security

    247
  • Port Security Command Options and Operation

    248
  • Retention of Static MAC Addresses

    252
  • Configuring Port Security

    254
  • Web: Displaying and Configuring Port Security Features

    259
  • How the Intrusion Log Operates

    260
  • Keeping the Intrusion Log Current by Resetting Alert Flags

    261
  • Using the Event Log To Find Intrusion Alerts

    266
  • And Resetting Alert Flags

    267
  • Configuring Protected Ports

    269
  • Using Authorized IP Managers

    271
  • Building IP Masks

    271
  • Configuration Options

    273
  • Defining Authorized Management Stations

    274
  • Menu: Viewing and Configuring IP Authorized Managers

    275
  • CLI: Viewing and Configuring Authorized IP Managers

    276
  • Configuring ip authorized managers for the switch

    277
  • Web: Configuring IP Authorized Managers

    279
  • Configuring multiple stations per authorized manager ip entry

    280
  • Additional Examples for Authorizing Multiple Stations

    282

Related Manuals

Below are links to the text of a wide variety of documents related to the HP Q.11. (2510-24) Access Security Manual.