HP 4100GL Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software HP 4100GL herunter. HP 4100GL User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 228
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1

access security guide www.hp.com/go/hpprocurve hp procurve series 4100gl switches

Seite 2

How RADIUS/802.1x Authentication Affects VLAN Operation . . 6-43 Static VLAN Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 3 - Switches

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Refer to “5. Configuring the Switch for SSH Authentication” on page 4-18. SSH

Seite 4

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation [port < 1-65535 | default >] The TCP port number for SSH connections (de

Seite 5

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation SSH does not protect the switch from unauthorized access via the web interface

Seite 6 - 2 TACACS+ Authentication

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Configures a password method for the primary and secondary enable (Manager) ac

Seite 7

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Syntax: aaa authentication ssh enable < local | tacacs | radius > <

Seite 8

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Figure 4-14 shows how to check the results of the above commands. Lists the cu

Seite 9

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Further Information on SSH Client Public-Key Authentication

Seite 10

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication 3. If there is not a match, and you have not configured th

Seite 11

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Notes Comments in public key files, such as smith@support.

Seite 12

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Note on Public The actual content of a public key entry in

Seite 13 - Getting Started

Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . . 8-4 Overview of IP Mask Operation . . . . . . . . . . . . . . . .

Seite 14 - Introduction

Configuring Secure Shell (SSH) Further Information on SSH Client Public-Key Authentication Syntax: clear crypto public-key Deletes the client-public-

Seite 15

Configuring Secure Shell (SSH) Messages Related to SSH Operation Messages Related to SSH Operation Message Meaning 00000K Peer unreachable. Indicate

Seite 16 - Simulating Display Output

Configuring Secure Shell (SSH) Messages Related to SSH Operation Message Meaning Error: Requested keyfile does not exist. The client key does not exi

Seite 17 - Related Publications

5 Configuring Secure Socket Layer (SSL) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 18

Configuring Secure Socket Layer (SSL) Overview Overview Feature Default Menu CLI Web Generating a Self Signed Certificate on the switch No n/a

Seite 19

Configuring Secure Socket Layer (SSL) Terminology HP Switch (SSL Server) SSL Client Browser 1. Switch-to-Client SSL Cert. 2. User-to-Switch (login pas

Seite 20 - Sources for More Information

Configuring Secure Socket Layer (SSL) Prerequisite for Using SSL  CA-Signed Certificate: A certificate verified by a third party certif- icate autho

Seite 21 - Need Only a Quick Start?

Configuring Secure Socket Layer (SSL) Steps for Configuring and Using SSL for Switch and Client Authentication 1. Install an SSL capable browser appl

Seite 22

Configuring Secure Socket Layer (SSL) General Operating Rules and Notes General Operating Rules and Notes  Once you generate a certificate on the sw

Seite 23

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Configuring the Switch for SSL Operation SSL-Related CLI Commands in Th

Seite 25

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Using the web browser interface To Configure Local Passwords. You can

Seite 26 - Menu: Setting Passwords

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation 2. Generating the Switch’s Server Host Certificate You must generate a

Seite 27

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation To Generate or Erase the Switch’s Server Certificate with the CLI Becau

Seite 28

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Comments on certificate fields. There are a number arguments used in th

Seite 29 - TACACS+ Authentication

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Notes "Zeroizing" the switch’s server host certificate or k

Seite 30

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Generate a Self-Signed Host Certificate with the Web browser interface

Seite 31 - Release G.05. xx

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation For example, to generate a new host certificate via the web browsers in

Seite 32 - Applications:

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Current SSL Host Certificate Figure 5-6. Web browser Interface showing

Seite 33 - General System Requirements

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation The installation of a CA-signed certificate involves interaction with o

Seite 34

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Certificate Request Certificate Request Reply -----BEGIN CERTIFICATE---

Seite 35 - Privilege Levels

Getting Started Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii Overvi

Seite 36

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Note Before enabling SSL on the switch you must generate the switch’s

Seite 37 - Before You Begin

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Using the CLI interface to enable SSL Syntax: [no] web-management ssl

Seite 38 - Configuration

Configuring Secure Socket Layer (SSL) Configuring the Switch for SSL Operation Enable SLL and port number Selection Figure 5-8. Using the web browser

Seite 39

Configuring Secure Socket Layer (SSL) Common Errors in SSL setup Common Errors in SSL setup Error During Possible Cause Generating host certificate o

Seite 41 - Login Primary

6 Configuring Port-Based Access Control (802.1x) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 42

Configuring Port-Based Access Control (802.1x) Overview OverviewFeature Default Menu CLI Web Configuring Switch Ports as 802.1x Authenticators D

Seite 43

Configuring Port-Based Access Control (802.1x) Overview  Local authentication of 802.1x clients using the switch’s local user- name and password (as

Seite 44 - Encryption Keys

Configuring Port-Based Access Control (802.1x) Overview Authenticating One Switch to Another. 802.1x authentication also enables the switch to operat

Seite 45

Configuring Port-Based Access Control (802.1x) How 802.1x Operates How 802.1x Operates Authenticator Operation This operation provides security on a d

Seite 46 - First-Choice TACACS+ Server

Getting Started Introduction Introduction This Access Security Guide is intended for use with the following switches:  HP Procurve Switch 4104GL 

Seite 47

Configuring Port-Based Access Control (802.1x) How 802.1x Operates Switch-Port Supplicant Operation This operation provides security on links between

Seite 48 - How Authentication Operates

Configuring Port-Based Access Control (802.1x) Terminology • A "failure" response continues the block on port B5 and causes port A1 to wait

Seite 49

Configuring Port-Based Access Control (802.1x) Terminology EAP (Extensible Authentication Protocol): EAP enables network access that supports multiple

Seite 50 - Local Authentication Process

Configuring Port-Based Access Control (802.1x) General Operating Rules and Notes member of that VLAN as long as at least one other port on the switch

Seite 51 - Using the Encryption Key

Configuring Port-Based Access Control (802.1x) General Operating Rules and Notes  If a client already has access to a switch port when you configure

Seite 52 - Authentication

Configuring Port-Based Access Control (802.1x) General Setup Procedure for Port-Based Access Control (802.1x) General Setup Procedure for Port-Based A

Seite 53 - Messages Related to TACACS+

Configuring Port-Based Access Control (802.1x) General Setup Procedure for Port-Based Access Control (802.1x) Overview: Configuring 802.1x Authenticat

Seite 54

Configuring Port-Based Access Control (802.1x) General Setup Procedure for Port-Based Access Control (802.1x) 7. If you are using Port Security on th

Seite 55

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators Configuring Switch Ports as 802.1x Authenticators 802

Seite 56

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators 1. Enable 802.1x Authentication on Selected Ports Thi

Seite 57

Getting Started Overview of Access Security Features Allows access to the switch by a networked device having an IP address previously configured in t

Seite 58

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators aaa port-access authenticator < port-list > (Sy

Seite 59 - Preparation:

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators aaa port-access authenticator < port-list > (Sy

Seite 60

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators 3. Configure the 802.1x Authentication Method This ta

Seite 61

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports as 802.1x Authenticators 4. Enter the RADIUS Host IP Address(es) If you select

Seite 62 - Want RADIUS To Protect

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 802.1x Open VLAN Mode802.1x Authentication Commands page 6-14 802.1x Supplicant

Seite 63 - SSH authentication

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode  1st Priority: The port joins a VLAN to which it has been assigned by a RADIUS

Seite 64

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Table 6-1. 802.1x Open VLAN Mode Options 802.1x Per-Port Configuration Port Res

Seite 65

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 802.1x Per-Port Configuration Port Response Open VLAN Mode with Only an Unauthor

Seite 66

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Operating Rules for Authorized-Client and Unauthorized-Client VLANs Condition Ru

Seite 67

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Condition Rule Multiple Authenticator Ports Using You can use the same static V

Seite 68

Getting Started Command Syntax Conventions Command Syntax Conventions This guide uses the following conventions for command syntax and displays. Synta

Seite 69 - Access When Using RADIUS

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Setting Up and Configuring 802.1x Open VLAN Mode Preparation. This section assume

Seite 70

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Note that as an alternative, you can configure the switch to use local password a

Seite 71

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode 3. If you selected either eap-radius or chap-radius for step 2, use the radius h

Seite 72

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Configuring 802.1x Open VLAN Mode. Use these commands to actually configure Open

Seite 73 -  IP address: 10.33.18.151

Configuring Port-Based Access Control (802.1x) 802.1x Open VLAN Mode Inspecting 802.1x Open VLAN Mode Operation. For information and an example on vi

Seite 74

Configuring Port-Based Access Control (802.1x) Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1x Devices  If an authentic

Seite 75 -  Start-Stop:

Configuring Port-Based Access Control (802.1x) Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1x Devices Note on If the p

Seite 76

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches Configuring

Seite 77 - Viewing RADIUS Statistics

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches 1. When po

Seite 78

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches Configuring

Seite 79

Getting Started Related Publications Screen Simulations Figures containing simulated screen text and command output look like this: Figure 1. Example

Seite 80 - RADIUS Accounting Statistics

Configuring Port-Based Access Control (802.1x) Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches aaa port-ac

Seite 81

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Displaying 802.1x Configuration, Statistics,

Seite 82

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters show port-access authenticator (Syntax Contin

Seite 83

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters An Unauth VLAN ID appearing in the Current VL

Seite 84

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters 25 as an authorized VLAN, then the port’s mem

Seite 85

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Syntax: show vlan < vlan-id > Displays

Seite 86

Configuring Port-Based Access Control (802.1x) Displaying 802.1x Configuration, Statistics, and Counters Show Commands for Port-Access Supplicant Synt

Seite 87

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation supplicant port to another without clearing the

Seite 88 - Prerequisite for Using SSH

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation For example, suppose that a RADIUS-authenticate

Seite 89 - Public Key Formats

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation This entry shows that port A2 is temporarily un

Seite 90

Getting Started Related Publications HP provides a PDF version of this guide on the Product Documentation CD-ROM shipped with the switch. You can also

Seite 91

Configuring Port-Based Access Control (802.1x) How RADIUS/802.1x Authentication Affects VLAN Operation When the 802.1x client’s session on port A2 end

Seite 92

Configuring Port-Based Access Control (802.1x) Messages Related to 802.1x Operation Messages Related to 802.1x Operation Table 6-2. 802.1x Operating

Seite 94

7 Configuring and Monitoring Port Security Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 95

Configuring and Monitoring Port Security Overview Overview Feature Default Menu CLI Web Displaying Current Port Security n/a — page 7-9 page 7

Seite 96 - Key for the

Configuring and Monitoring Port Security Basic Operation General Operation for Port Security. On a per-port basis, you can configure security measures

Seite 97 - Modulus <n>

Configuring and Monitoring Port Security Basic Operation Switch A Port Security Configured Switch B MAC Address Authorized by Switch A PC 1 MAC Addres

Seite 98

Configuring and Monitoring Port Security Planning Port Security Planning Port Security 1. Plan your port security configuration and monitoring accord

Seite 99 - Client Contact Behavior

Configuring and Monitoring Port Security Port Security Command Options and Operation Port Security Command Options and Operation Port Security Command

Seite 100 -  Execute no ip ssh

Configuring and Monitoring Port Security Port Security Command Options and Operation Table 7-1. Port Security Parameters Parameter Description Port

Seite 101

Getting Started Getting Documentation From the Web Getting Documentation From the Web 1. Go to the HP Procurve website at http://www.hp.com/go/hpproc

Seite 102

Configuring and Monitoring Port Security Port Security Command Options and Operation Parameter Description Action action <none | send-alarm | sen

Seite 103

Configuring and Monitoring Port Security Port Security Command Options and Operation Assigned/Authorized Addresses. : If you manually assign a MAC ad

Seite 104

Configuring and Monitoring Port Security Port Security Command Options and Operation With port numbers included in the command, show port-security dis

Seite 105

Configuring and Monitoring Port Security Port Security Command Options and Operation For information on the individual control parameters, see the Por

Seite 106 - Public-Key Authentication

Configuring and Monitoring Port Security Port Security Command Options and Operation The Address Limit has not been reached. Although the Address Limi

Seite 107 - Comment

Configuring and Monitoring Port Security Port Security Command Options and Operation If you are adding a device (MAC address) to a port on which the A

Seite 108

Configuring and Monitoring Port Security Port Security Command Options and Operation Note You can reduce the address limit below the number of curren

Seite 109 - Key Index

Configuring and Monitoring Port Security Web: Displaying and Configuring Port Security Features Web: Displaying and Configuring Port Security Features

Seite 110

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags – The show port-security intrusion-log command displays t

Seite 111

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags The log shows the most recent intrusion at the top of the

Seite 113 - Contents

Getting Started Sources for More Information Sources for More Information  If you need information on specific parameters in the menu interface, ref

Seite 114 - Overview

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags The Intrusion Alert column shows “Yes” for any port on whi

Seite 115 - Terminology

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags (The intrusion log holds up to 20 intrusion records and de

Seite 116 - Prerequisite for Using SSL

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Intrusion Alert on port A1. Figure 7-12. Example of an Una

Seite 117

Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags Intrusion Alert on port A1 is now cleared. Figure 7-14. Ex

Seite 118

Configuring and Monitoring Port Security Operating Notes for Port Security From the Menu Interface: In the Main Menu, click on 4. Event Log and use Ne

Seite 119 - Operation

Configuring and Monitoring Port Security Operating Notes for Port Security Without both of the above configured, the switch detects only the proxy ser

Seite 121

8 Using Authorized IP Managers Contents Using Authorized IP Managers Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 122

Using Authorized IP Managers Overview Overview Authorized IP Manager Features Feature Default Menu CLI Web Listing (Showing) Authorized Managers n

Seite 123

Using Authorized IP Managers Options Options You can configure:  Up to 10 authorized manager addresses, where each address applies to either a singl

Seite 124 - Show host certificate

Getting Started Need Only a Quick Start? Need Only a Quick Start? IP Addressing. If you just want to give the switch an IP address so that it can com

Seite 125

Using Authorized IP Managers Defining Authorized Management Stations Defining Authorized Management Stations  Authorizing Single Stations: The table

Seite 126

Using Authorized IP Managers Defining Authorized Management Stations rized Manager IP address to authorize four IP addresses for management station ac

Seite 127 - Host Certificate

Using Authorized IP Managers Defining Authorized Management Stations 2. Enter an Authorized Manager IP address here. 5. Press [Enter], then [S] (fo

Seite 128

Using Authorized IP Managers Defining Authorized Management Stations The above example shows an Authorized IP Manager List that allows stations to acc

Seite 129 - Browser Contact Behavior

Using Authorized IP Managers Web: Configuring IP Authorized Managers The result of entering the preceeding example is: • Authorized Station IP Addres

Seite 130

Using Authorized IP Managers Building IP Masks For web-based help on how to use the web browser interface screen, click on the [?] button provided on

Seite 131

Using Authorized IP Managers Building IP Masks Configuring Multiple Stations Per Authorized Manager IP Entry The mask determines whether the IP addres

Seite 132 - Enable SLL

Using Authorized IP Managers Building IP Masks Figure 8-5. Analysis of IP Mask for Multiple-Station Entries 1st Octet 2nd Octet 3rd Octet 4th Octet Ma

Seite 133 - Common Errors in SSL setup

Using Authorized IP Managers Operating Notes Additional Examples for Authorizing Multiple Stations Entries for Authorized Manager List Results IP Mask

Seite 134

Using Authorized IP Managers Operating Notes • Even if you need proxy server access enabled in order to use other applications, you can still elimina

Seite 137

Index Numerics 3DES … 4-3, 5-3 802.1x See port-based access control. …6-1 A aaa authentication … 2-9 access levels, authorized IP managers … 8-3 accou

Seite 138

inconsistent value … 7-12 O open VLAN mode See port access control OpenSSH … 4-3, 5-2 operating notes authorized IP managers … 8-12 port security … 7-

Seite 139 - How 802.1x Operates

supplicant, enabling … 6-34 switch username and password … 6-3 terminology…6-7 troubleshooting, gvrp … 6-43 used with port-security … 6-31 VLAN operat

Seite 140

host key pair … 4-11 key, babble … 4-11 key, fingerprint … 4-11 keys, zeroizing … 4-11 key-size … 4-17 known-host file … 4-13, 4-15 man-in-the-middle

Seite 141

overview … 1-xii precautions … 2-6 preparing to configure … 2-9 preventing switch lockout … 2-15 privilege level code … 2-7 server access … 2-15 serve

Seite 144

Technical information in this documentis subject to change without notice.©Copyright Hewlett-Packard Company 2000, 2002.All right reserved.Reprodu

Seite 145 - Access Control (802.1x)

1 Configuring Username and Password Security Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 146

Configuring Username and Password Security Overview Overview Feature Default Menu CLI Web Set Usernames no user names set — — page 1-6 Set a P

Seite 147

Configuring Username and Password Security Overview If you do steps 1 and 2, above, then the next time a console session is started for either the men

Seite 148 - Authenticators

Configuring Username and Password Security Configuring Local Password Security Configuring Local Password Security Menu: Setting Passwords As noted ea

Seite 149

Configuring Username and Password Security Configuring Local Password Security If you have physical access to the switch, press and hold the Clear but

Seite 150

Configuring Username and Password Security Configuring Local Password Security To Remove Password Protection. Removing password protection means to e

Seite 151

2 TACACS+ Authentication Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 152

HP Procurve Series 4100GL Switches Access Security Guide Software Release G.07.XX or Greater

Seite 153

TACACS+ Authentication Overview Overview Feature Default Menu CLI Web view the switch’s authentication configuration n/a — page 2-10 — view the

Seite 154 - 802.1x Open VLAN Mode

TACACS+ Authentication Overview server and (2) local passwords configured on the switch. That is, with TACACS+ configured, the switch first tries to c

Seite 155 - 802.1x Open VLAN Mode

TACACS+ Authentication Terminology Used in TACACS Applications: Terminology Used in TACACS Applications:  NAS (Network Access Server): This is an i

Seite 156

TACACS+ Authentication General System Requirements • TACACS+ Authentication: This method enables you to use a TACACS+ server in your network to assi

Seite 157

TACACS+ Authentication General Authentication Setup Procedure Notes The effectiveness of TACACS+ security depends on correctly using your TACACS+ ser

Seite 158 - Unauthorized-Client VLANs

TACACS+ Authentication General Authentication Setup Procedure 2. Determine the following: • The IP address(es) of the TACACS+ server(s) you want the

Seite 159

TACACS+ Authentication General Authentication Setup Procedure Caution You should ensure that the switch has a local Manager password. Other- wise, if

Seite 160

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring TACACS+ on the Switch Before You Begin If you are new to TACACS+ authentication,

Seite 161

TACACS+ Authentication Configuring TACACS+ on the Switch Viewing the Switch’s Current Authentication Configuration This command lists the number of lo

Seite 162

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring the Switch’s Authentication Methods The aaa authentication command configures the

Seite 163

© Copyright 2001-2002 Hewlett-Packard Company All Rights Reserved. This document contains information which is protected by copyright. Reproduction, a

Seite 164

TACACS+ Authentication Configuring TACACS+ on the Switch Table 2-1. AAA Authentication Parameters Name Default Range Function console n/a n/a S

Seite 165 - 802.1x Devices

TACACS+ Authentication Configuring TACACS+ on the Switch Table 2-2. Primary/Secondary Authentication Table Access Method and Privilege Level Authenti

Seite 166 - 802.1x Device

TACACS+ Authentication Configuring TACACS+ on the Switch For example, here is a set of access options and the corresponding commands to configure the

Seite 167 - Other Switches

TACACS+ Authentication Configuring TACACS+ on the Switch Configuring the Switch’s TACACS+ Server Access The tacacs-server command configures these par

Seite 168

TACACS+ Authentication Configuring TACACS+ on the Switch Note on Encryption Keys Syntax: tacacs-server host < ip-addr > [key < key-string &

Seite 169

TACACS+ Authentication Configuring TACACS+ on the Switch Name Default Range host <ip-addr> [key <key-string> none n/a Specifies the IP

Seite 170

TACACS+ Authentication Configuring TACACS+ on the Switch Name Default Range Name Default Range key <key-string> none (null) n/a Specifies

Seite 171 - Statistics, and Counters

TACACS+ Authentication Configuring TACACS+ on the Switch The "10" server is now the "first-choice" TACACS+ authentication device.

Seite 172

TACACS+ Authentication How Authentication Operates To delete a per-server encryption key in the switch, re-enter the tacacs-server host command withou

Seite 173

TACACS+ Authentication How Authentication Operates Using figure 2-6, above, after either switch detects an operator’s logon request from a remote or d

Seite 174

Contents Getting Started Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Int

Seite 175

TACACS+ Authentication How Authentication Operates Local Authentication Process When the switch is configured to use TACACS+, it reverts to local auth

Seite 176 -  The switch reboots

TACACS+ Authentication How Authentication Operates Using the Encryption Key General Operation When used, the encryption key (sometimes termed "ke

Seite 177

TACACS+ Authentication Controlling Web Browser Interface Access When Using TACACS+ Authentication For example, you would use the next command to confi

Seite 178

TACACS+ Authentication Messages Related to TACACS+ Operation Messages Related to TACACS+ Operation The switch generates the CLI messages listed below

Seite 179

TACACS+ Authentication Operating Notes  When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ servers are not acces

Seite 180 - After the 802.1x session

3 RADIUS Authentication and Accounting Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 181

RADIUS Authentication and Accounting Overview Overview Feature Default Menu CLI Web Configuring RADIUS Authentication None n/a 3-6 n/a Configu

Seite 182

RADIUS Authentication and Accounting Terminology Terminology CHAP (Challenge-Handshake Authentication Protocol): A challenge- response authentication

Seite 183

RADIUS Authentication and Accounting Switch Operating Rules for RADIUS Switch Operating Rules for RADIUS  You must have at least one RADIUS server a

Seite 184 - Basic Operation

RADIUS Authentication and Accounting General RADIUS Setup Procedure General RADIUS Setup Procedure Preparation: 1. Configure one to three RADIUS serv

Seite 185

2 TACACS+ Authentication Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Ov

Seite 186 - • PC1 can access Switch A

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Configuring the Switch for RADIUS Authentication RADIUS Authenti

Seite 187 - Planning Port Security

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication Note This step assumes you have already configured the RADIUS s

Seite 188

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 1. Configure Authentication for the Access Methods You Want RADI

Seite 189

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose you have already configured local passwords

Seite 190

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 2. Configure the Switch To Access a RADIUS Server This section d

Seite 191

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication For example, suppose you have configured the switch as shown in

Seite 192 - Configuring Port Security

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication 3. Configure the Switch’s Global RADIUS Parameters You can confi

Seite 193

RADIUS Authentication and Accounting Configuring the Switch for RADIUS Authentication radius-server timeout < 1 .. 15 > Specifies the maximum ti

Seite 194

RADIUS Authentication and Accounting Local Authentication Process After two attempts failing due to username or password entry errors, the switch will

Seite 195

RADIUS Authentication and Accounting Controlling Web Browser Interface Access When Using RADIUS Authentication For local authentication, the switch us

Seite 196

Outline of the Steps for Configuring RADIUS Authentication . . . . . . 3-6 1. Configure Authentication for the Access Methods You Want RADIUS To Pro

Seite 197 - Alert Flags

RADIUS Authentication and Accounting Configuring RADIUS Accounting Configuring RADIUS Accounting RADIUS Accounting Commands Page [no] radius-server h

Seite 198

RADIUS Authentication and Accounting Configuring RADIUS Accounting (For 802.1x information for the switch, refer to “Configuring Port-Based Access Con

Seite 199 - Resetting Alert Flags

RADIUS Authentication and Accounting Configuring RADIUS Accounting  If access to a RADIUS server fails during a session, but after the client has be

Seite 200

RADIUS Authentication and Accounting Configuring RADIUS Accounting 1. Configure the Switch To Access a RADIUS Server Before you configure the actual a

Seite 201 - Yes” for the port on which

RADIUS Authentication and Accounting Configuring RADIUS Accounting Because the radius-server command includes an acct-port element with a non default

Seite 202

RADIUS Authentication and Accounting Configuring RADIUS Accounting  Start-Stop: • Send a start record accounting notice at the beginning of the acc

Seite 203

RADIUS Authentication and Accounting Configuring RADIUS Accounting 3. (Optional) Configure Session Blocking and Interim Updating Options These optiona

Seite 204

RADIUS Authentication and Accounting Viewing RADIUS Statistics Viewing RADIUS Statistics General RADIUS Statistics Syntax: show radius [ host < ip

Seite 205

RADIUS Authentication and Accounting Viewing RADIUS Statistics Term Definition Round Trip Time The time interval between the most recent Accounting-

Seite 206

RADIUS Authentication and Accounting Viewing RADIUS Statistics RADIUS Authentication Statistics Syntax: show authentication Displays the primary and

Seite 207

1. Assigning a Local Login (Operator) and Enable (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 2. Generating t

Seite 208

RADIUS Authentication and Accounting Viewing RADIUS Statistics RADIUS Accounting Statistics Syntax: show accounting Lists configured accounting inter

Seite 209 - Access Levels

RADIUS Authentication and Accounting Changing RADIUS-Server Access Order Figure 3-16. Example Listing of Active RADIUS Accounting Sessions on the Swit

Seite 210 - Stations

RADIUS Authentication and Accounting Changing RADIUS-Server Access Order To exchange the positions of the addresses so that the server at 10.10.10.003

Seite 211 - Managers

RADIUS Authentication and Accounting Messages Related to RADIUS Operation Messages Related to RADIUS Operation Message Meaning Can’t reach RADIUS ser

Seite 213

4 Configuring Secure Shell (SSH) Contents Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 214

Configuring Secure Shell (SSH) Overview Overview Feature Default Menu CLI Web Generating a public/private key pair on the switch No n/a page 4-

Seite 215 - Building IP Masks

Configuring Secure Shell (SSH) Terminology Note SSH in the HP Procurve Series 4100GL switches is based on the OpenSSH software toolkit. For more info

Seite 216 - IP Entry

Configuring Secure Shell (SSH) Prerequisite for Using SSH  PEM (Privacy Enhanced Mode): Refers to an ASCII-formatted client public-key that has been

Seite 217

Configuring Secure Shell (SSH) Public Key Formats Public Key Formats Any client application you use for client public-key authentication with the swit

Seite 218 - Operating Notes

6 Configuring Port-Based Access Control (802.1x) Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 219 - Using Authorized IP Managers

Configuring Secure Shell (SSH) Steps for Configuring and Using SSH for Switch and Client Authentication Switch Access Level Primary SSH Authentication

Seite 220

Configuring Secure Shell (SSH) Steps for Configuring and Using SSH for Switch and Client Authentication B. Switch Preparation 1. Assign a login (Oper

Seite 221 - Index – 1

Configuring Secure Shell (SSH) General Operating Rules and Notes General Operating Rules and Notes  Public keys generated on an SSH client must be e

Seite 222 - 2 – Index

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Configuring the Switch for SSH Operation SSH-Related Commands in This Section

Seite 223 - Index – 3

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Syntax: password < manager | operator | all > Figure 4-6. Example of Co

Seite 224 - 4 – Index

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Notes When you generate a host key pair on the switch, the switch places the

Seite 225 - Index – 5

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation For example, to generate and display a new key: Host Public Key for the Switch

Seite 226 - 6 – Index

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation distribution to clients is to use a direct, serial connection between the swit

Seite 227

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation 4. Add any data required by your SSH client application. For example Before s

Seite 228 - 5990-3032

Configuring Secure Shell (SSH) Configuring the Switch for SSH Operation Hexadecimal "Fingerprints" of the Same Switch Phonetic "Hash&qu

Kommentare zu diesen Handbüchern

Keine Kommentare