HP Q.11. (2510-24) Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software HP Q.11. (2510-24) herunter. HP Q.11. (2510-24) User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 294
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - ProCurve Switches

Access Security Guide2510www.procurve.comProCurve SwitchesQ.11. (2510-24)U.11. (2510-48)XXXX

Seite 2

viiiGeneral Setup Procedure for 802.1X Access Control . . . . . . . . . . . . . . . . 8-14Do These Steps Before You Configure 802.1X Operation . .

Seite 3 - Access Security Guide

4-26TACACS+ AuthenticationConfiguring TACACS+ on the Switch When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ se

Seite 4

5-15RADIUS Authentication and AccountingContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 5

5-2RADIUS Authentication and AccountingOverviewOverviewRADIUS (Remote Authentication Dial-In User Service) enables you to use up to three servers (one

Seite 6 - 3 Web and MAC Authentication

5-3RADIUS Authentication and AccountingTerminologyTerminologyCHAP (Challenge-Handshake Authentication Protocol): A challenge-response authentication p

Seite 7 - 4 TACACS+ Authentication

5-4RADIUS Authentication and AccountingSwitch Operating Rules for RADIUSSwitch Operating Rules for RADIUS You must have at least one RADIUS server ac

Seite 8

5-5RADIUS Authentication and AccountingGeneral RADIUS Setup ProcedureGeneral RADIUS Setup ProcedurePreparation:1. Configure one to three RADIUS server

Seite 9

5-6RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationConfiguring the Switch for RADIUS Authentication• Determine whe

Seite 10

5-7RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationOutline of the Steps for Configuring RADIUS AuthenticationThere

Seite 11

5-8RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authenticationout on a server that is unavailable. If you want to use this fe

Seite 12

5-9RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have already configured local password

Seite 13 - Product Documentation

ix9 Configuring and Monitoring Port SecurityContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 14 - Feature Index

5-10RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication2. Configure the Switch To Access a RADIUS ServerThis section

Seite 15

5-11RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have configured the switch as shown i

Seite 16

5-12RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication3. Configure the Switch’s Global RADIUS ParametersYou can conf

Seite 17 - Getting Started

5-13RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication Note Where the switch has multiple RADIUS servers configured

Seite 18 - Introduction

5-14RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose that your switch is configured to use thr

Seite 19

5-15RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFigure 5-6. Listings of Global RADIUS Parameters Configured In

Seite 20

5-16RADIUS Authentication and AccountingLocal Authentication ProcessLocal Authentication ProcessWhen the switch is configured to use RADIUS, it revert

Seite 21 - Conventions

5-17RADIUS Authentication and AccountingControlling Web Browser Interface Access When Using RADIUS AuthenticationControlling Web Browser Interface Acc

Seite 22 - Port Identity Examples

5-18RADIUS Authentication and AccountingConfiguring RADIUS AccountingNote This section assumes you have already: Configured RADIUS authentication on

Seite 23 - Sources for More Information

5-19RADIUS Authentication and AccountingConfiguring RADIUS AccountingThe switch forwards the accounting information it collects to the designated RADI

Seite 24 - Need Only a Quick Start?

xBuilding IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9Configuring One Station Per Author

Seite 25

5-20RADIUS Authentication and AccountingConfiguring RADIUS Accounting– Optional—if you are also configuring the switch for RADIUS authentication, and

Seite 26

5-21RADIUS Authentication and AccountingConfiguring RADIUS Accounting(For a more complete description of the radius-server command and its options, tu

Seite 27

5-22RADIUS Authentication and AccountingConfiguring RADIUS AccountingFigure 5-7. Example of Configuring for a RADIUS Server with a Non-Default Account

Seite 28

5-23RADIUS Authentication and AccountingConfiguring RADIUS Accounting Start-Stop: • Send a start record accounting notice at the beginning of the acc

Seite 29

5-24RADIUS Authentication and AccountingConfiguring RADIUS Accounting3. (Optional) Configure Session Blocking and Interim Updating OptionsThese option

Seite 30 - Menu: Setting Passwords

5-25RADIUS Authentication and AccountingViewing RADIUS StatisticsViewing RADIUS StatisticsGeneral RADIUS StatisticsFigure 5-10. Example of General RAD

Seite 31

5-26RADIUS Authentication and AccountingViewing RADIUS StatisticsFigure 5-11. RADIUS Server Information From the Show Radius Host Command

Seite 32 - [?] in the web

5-27RADIUS Authentication and AccountingViewing RADIUS StatisticsTable 5-2. Values for Show Radius Host Output (Figure 5-11)Term DefinitionRound Trip

Seite 33 - Front-Panel Security

5-28RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Authentication StatisticsFigure 5-12. Example of Login Attempt and Primary/Sec

Seite 34 - Clear Button

5-29RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Accounting StatisticsFigure 5-14. Listing the Accounting Configuration in the

Seite 35 - Reset Button

xiProduct DocumentationAbout Your Switch Manual SetThe switch manual set includes the following: Read Me First - a printed guide shipped with your sw

Seite 36

5-30RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderFigure 5-16. Example Listing of Active RADIUS Accounting Sessions on the Sw

Seite 37

5-31RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderTo exchange the positions of the addresses so that the server at 10.10.10.0

Seite 38

5-32RADIUS Authentication and AccountingMessages Related to RADIUS OperationMessages Related to RADIUS OperationMessage MeaningCan’t reach RADIUS serv

Seite 39

6-16Configuring Secure Shell (SSH)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 40

6-2Configuring Secure Shell (SSH)OverviewOverviewThe ProCurve switches covered in this guide use Secure Shell version 1 or 2 (SSHv1 or SSHv2) to provi

Seite 41 - Password Recovery

6-3Configuring Secure Shell (SSH)OverviewNote SSH in the ProCurve is based on the OpenSSH software toolkit. For more information on OpenSSH, visit www

Seite 42 - [N] (for “No”)

6-4Configuring Secure Shell (SSH)TerminologyTerminology SSH Server: A ProCurve switch with SSH enabled. Key Pair: A pair of keys generated by the sw

Seite 43 - Password Recovery Process

6-5Configuring Secure Shell (SSH)Prerequisite for Using SSHPrerequisite for Using SSHBefore using the switch as an SSH server, you must install a publ

Seite 44

6-6Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationSteps for Configuring and Using SSHfor Switch

Seite 45 - Web and MAC Authentication

6-7Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationB. Switch Preparation1. Assign a login (Opera

Seite 46

xiiProduct DocumentationFeature IndexFor the manual set supporting your switch model, the following feature index indicates which manual to consult fo

Seite 47 - Client Options

6-8Configuring Secure Shell (SSH)General Operating Rules and NotesGeneral Operating Rules and Notes Public keys generated on an SSH client must be ex

Seite 48 - General Features

6-9Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationConfiguring the Switch for SSH Operation1. Assign Local Login (Operator) and

Seite 49 - Authenticator Operation

6-10Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-5. Example of Configuring Local Passwords2. Generate the Switch’s P

Seite 50

6-11Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationNotes When you generate a host key pair on the switch, the switch places the

Seite 51 - MAC-based Authentication

6-12Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFor example, to generate and display a new key:Figure 6-6. Example of Genera

Seite 52

6-13Configuring Secure Shell (SSH)Configuring the Switch for SSH Operationdistribution to clients is to use a direct, serial connection between the sw

Seite 53

6-14Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation4. Add any data required by your SSH client application. For example Before

Seite 54 - Operating Rules and Notes

6-15Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-10. Examples of Visual Phonetic and Hexadecimal Conversions of the

Seite 55

6-16Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationSSH Client Contact Behavior. At the first contact between the switch and an

Seite 56

6-17Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationNote on Port NumberProCurve recommends using the default TCP port number (22

Seite 57

xiiiProduct DocumentationLLDP X - -MAC Address Management X --Monitoring and Analysis X - -Multicast Filtering - X -Network Management Applications (L

Seite 58 - Addresses

6-18Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationCaution Protect your private key file from access by anyone other than yours

Seite 59 - RADIUS Server

6-19Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationOption B: Configuring the Switch for Client Public-Key SSH Authentication.

Seite 60

6-20Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationWith steps 1 - 3, above, completed and SSH properly configured on the switch

Seite 61

6-21Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-12. Configuring for SSH Access Requiring a Client Public-Key Match

Seite 62

6-22Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation6. Use an SSH Client To Access the SwitchTest the SSH configuration on the s

Seite 63

6-23Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFurther Information on SSH Client Public-Key Authenticati

Seite 64

6-24Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key Authentication3. If there is not a match, and you have not configured t

Seite 65

6-25Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationNotes Comments in public key files, such as smith@support

Seite 66

6-26Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationCopying a client-public-key into the switch requires the

Seite 67

6-27Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFor example, if you wanted to copy a client public-key fi

Seite 68

xivProduct DocumentationTelnet Access X - -TFTP X --Time Protocols (TimeP, SNTP) X - -Troubleshooting X --VLANs - X -Xmodem X --Feature Management and

Seite 69

6-28Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationCaution To enable client public-key authentication to blo

Seite 70 - Web-Based Authentication

6-29Configuring Secure Shell (SSH)Messages Related to SSH OperationMessages Related to SSH OperationMessage Meaning00000K Peer unreachable.Indicates a

Seite 71

6-30Configuring Secure Shell (SSH)Messages Related to SSH OperationGenerating new RSA host key. If the cache is depleted, this could take up to two m

Seite 72 - MAC-Based Authentication

7-17Configuring Secure Socket Layer (SSL)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 73

7-2Configuring Secure Socket Layer (SSL)OverviewOverviewThe ProCurve switches covered by this manual use Secure Socket Layer Version 3 (SSLv3) and sup

Seite 74 - Show Client Status

7-3Configuring Secure Socket Layer (SSL)TerminologyFigure 7-1. Switch/User AuthenticationSSL on the ProCurve switches supports these data encryption m

Seite 75

7-4Configuring Secure Socket Layer (SSL)Terminology Self-Signed Certificate: A certificate not verified by a third-party certificate authority (CA).

Seite 76

7-5Configuring Secure Socket Layer (SSL)Prerequisite for Using SSLPrerequisite for Using SSLBefore using the switch as an SSL server, you must install

Seite 77 - Applications:

7-6Configuring Secure Socket Layer (SSL)General Operating Rules and NotesGeneral Operating Rules and Notes Once you generate a certificate on the swi

Seite 78

7-7Configuring Secure Socket Layer (SSL)General Operating Rules and NotesConfiguring the Switch for SSL Operation1. Assign Local Login (Operator) and

Seite 79 - General System Requirements

1-11Getting StartedContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Ov

Seite 80

7-8Configuring Secure Socket Layer (SSL)General Operating Rules and NotesUsing the web browser interface To Configure Local Passwords. You can config

Seite 81 - Privilege Levels

7-9Configuring Secure Socket Layer (SSL)General Operating Rules and Notesto connect via SSL to the switch. (The session key pair mentioned above is no

Seite 82 - Before You Begin

7-10Configuring Secure Socket Layer (SSL)General Operating Rules and NotesCLI commands used to generate a Server Host Certificate. To generate a host

Seite 83 - Configuration

7-11Configuring Secure Socket Layer (SSL)General Operating Rules and NotesTable 7-1. Certificate Field Descriptions For example, to generate a key and

Seite 84 - Contact Configuration

7-12Configuring Secure Socket Layer (SSL)General Operating Rules and NotesCLI Command to view host certificates. To view the current host certificate

Seite 85

7-13Configuring Secure Socket Layer (SSL)General Operating Rules and Notesi. Select the Security tab then the [SSL] button. The SSL configuration scre

Seite 86

7-14Configuring Secure Socket Layer (SSL)General Operating Rules and NotesFor example, to generate a new host certificate via the web browsers inter-f

Seite 87 - Login Primary

7-15Configuring Secure Socket Layer (SSL)General Operating Rules and NotesFigure 7-6. Web browser Interface showing current SSL Host CertificateGenera

Seite 88

7-16Configuring Secure Socket Layer (SSL)General Operating Rules and Notesthat involves having the certificate authority verify the certificate reques

Seite 89

7-17Configuring Secure Socket Layer (SSL)General Operating Rules and Notes Figure 7-7. Example of a Certificate Request and Reply3. Enable SSL on the

Seite 90 - Encryption Keys

1-2Getting StartedIntroductionIntroductionThis Access Security Guide describes how to use ProCurve’s switch security features to protect access to you

Seite 91

7-18Configuring Secure Socket Layer (SSL)General Operating Rules and NotesNote Before enabling SSL on the switch you must generate the switch’s host c

Seite 92 - First-Choice TACACS+ Server

7-19Configuring Secure Socket Layer (SSL)General Operating Rules and NotesUsing the CLI interface to enable SSLTo enable SSL on the switch1. Generate

Seite 93

7-20Configuring Secure Socket Layer (SSL)General Operating Rules and NotesFigure 7-8. Using the web browser interface to enable SSL and select TCP por

Seite 94 - How Authentication Operates

7-21Configuring Secure Socket Layer (SSL)Common Errors in SSL SetupCommon Errors in SSL SetupError During Possible CauseGenerating host certificate on

Seite 95

7-22Configuring Secure Socket Layer (SSL)Common Errors in SSL Setup

Seite 96

8-18Configuring Port-Based and Client-Based Access Control (802.1X)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 97 - Using the Encryption Key

8-2Configuring Port-Based and Client-Based Access Control (802.1X)ContentsSetting Up and Configuring 802.1X Open VLAN Mode . . . . . . . . . . . . 8-

Seite 98 - Access When Using TACACS+

8-3Configuring Port-Based and Client-Based Access Control (802.1X)OverviewOverviewWhy Use Port-Based or Client-Based Access Control?Local Area Network

Seite 99 - Messages Related to TACACS+

8-4Configuring Port-Based and Client-Based Access Control (802.1X)OverviewPort-Based access control option allowing authentication by a single client

Seite 100 - TACACS+ Authentication

8-5Configuring Port-Based and Client-Based Access Control (802.1X)Overview802.1X Port-Based Access Control802.1X port-based access control provides po

Seite 101 - Contents

1-3Getting StartedOverview of Access Security Features Port-Based Access Control (802.1X) (page 8-1): On point-to-point connections, enables the swit

Seite 102 - Overview

8-6Configuring Port-Based and Client-Based Access Control (802.1X)Overviewaccess from a master database in a single server (although you can use up to

Seite 103 - Terminology

8-7Configuring Port-Based and Client-Based Access Control (802.1X)TerminologyTerminology802.1X-Aware: Refers to a device that is running either 802.1X

Seite 104

8-8Configuring Port-Based and Client-Based Access Control (802.1X)TerminologyEAPOL: Extensible Authentication Protocol Over LAN, as defined in the 802

Seite 105

8-9Configuring Port-Based and Client-Based Access Control (802.1X)Terminologydesignate as the Unauthorized-Client VLAN.) A port configured to use a gi

Seite 106 - Authentication

8-10Configuring Port-Based and Client-Based Access Control (802.1X)General 802.1X Authenticator OperationGeneral 802.1X Authenticator OperationThis op

Seite 107

8-11Configuring Port-Based and Client-Based Access Control (802.1X)General 802.1X Authenticator Operationii. If the client is successfully authenticat

Seite 108 - You Want RADIUS To Protect

8-12Configuring Port-Based and Client-Based Access Control (802.1X)General Operating Rules and Notes3. Port A1 replies with an MD5 hash response based

Seite 109 - SSH authentication

8-13Configuring Port-Based and Client-Based Access Control (802.1X)General Operating Rules and Notesport. If another client uses an 802.1X supplicant

Seite 110

8-14Configuring Port-Based and Client-Based Access Control (802.1X)General Setup Procedure for 802.1X Access ControlGeneral Setup Procedure for 802.1X

Seite 111

8-15Configuring Port-Based and Client-Based Access Control (802.1X)General Setup Procedure for 802.1X Access ControlOverview: Configuring 802.1X Authe

Seite 113

1-4Getting StartedOverview of Access Security FeaturesTable 1-1. Management Access Security ProtectionGeneral Switch Traffic Security GuidelinesWhere

Seite 114

8-16Configuring Port-Based and Client-Based Access Control (802.1X)General Setup Procedure for 802.1X Access Control7. If you are using Port Security

Seite 115

8-17Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsConfiguring Switch Ports as 802.1X

Seite 116 - Local Authentication Process

8-18Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsA. Enable the Selected Ports as Au

Seite 117 - Configuring RADIUS Accounting

8-19Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsPort-Based 802.1X Authentication.

Seite 118

8-20Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators2. Reconfigure Settings for Port-A

Seite 119

8-21Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators[quiet-period < 0 - 65535 >]

Seite 120

8-22Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators[reauth-period < 0 - 9999999 &g

Seite 121

8-23Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators3. Configure the 802.1X Authentica

Seite 122 - Reports to the RADIUS Server

8-24Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators4. Enter the RADIUS Host IP Addres

Seite 123

8-25Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators6. Optionally Resetting Authentica

Seite 124 - Updating Options

1-5Getting StartedConventionsConventionsThis guide uses the following conventions for command syntax and displayed information.Command Syntax Statemen

Seite 125 - Viewing RADIUS Statistics

8-26Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN Mode802.1X Open VLAN ModeIntroductionThis section describes how to

Seite 126

8-27Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote On ports configured to allow multiple sessions using 802.

Seite 127

8-28Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote After client authentication, the port resumes membership

Seite 128

8-29Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeTable 8-1. 802.1X Open VLAN Mode Options802.1X Per-Port Config

Seite 129 - RADIUS Accounting Statistics

8-30Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeOpen VLAN Mode with Only an Unauthorized-Client VLAN Configure

Seite 130

8-31Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeOperating Rules for Authorized-Client andUnauthorized-Client V

Seite 131

8-32Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeTemporary VLAN Membership During a Client Session• Port member

Seite 132 - as both the

8-33Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeIP Addressing for a Client Connected to a Port Configured for

Seite 133

8-34Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote If you use the same VLAN as the Unauthorized-Client VLAN

Seite 134

8-35Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN Mode A client must either have a valid IP address configured befo

Seite 135 - www.openssh.com

1-6Getting StartedConventionsCommand PromptsIn the default configuration, your switch displays the following CLI prompt:ProCurve Switch 2510-24#To sim

Seite 136

8-36Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN Mode2. Configure the 802.1X authentication type. Options include:3

Seite 137 - Public Key Formats

8-37Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote If you want to implement the optional port security featu

Seite 138

8-38Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeInspecting 802.1X Open VLAN Mode Operation. For information a

Seite 139

8-39Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeRADIUS-assigned VLAN, then an authenticated client without tag

Seite 140

8-40Configuring Port-Based and Client-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Device

Seite 141 - Operation

8-41Configuring Port-Based and Client-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Device

Seite 142

8-42Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Seite 143

8-43Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Seite 144 - Key for the

8-44Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Seite 145 - Modulus <n>

8-45Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Seite 146

1-7Getting StartedSources for More InformationSources for More InformationFor additional information about switch operation and features not covered i

Seite 147 - Client Contact Behavior

8-46Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Seite 148 - ■ Execute no ip ssh

8-47Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersDisplaying 802.1X Configur

Seite 149

8-48Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Countersshow port-access authentic

Seite 150

8-49Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 8-7. Example of sho

Seite 151

8-50Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersViewing 802.1X Open VLAN M

Seite 152

8-51Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Counters When the Unauth VLAN ID

Seite 153

8-52Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 8-9. Example of Sho

Seite 154

8-53Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersShow Commands for Port-Acc

Seite 155 - Public-Key Authentication

8-54Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN Operationsupplicant port to another w

Seite 156 - Bit Size Exponent <e>

8-55Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFor example, suppose that a

Seite 157

1-8Getting StartedNeed Only a Quick Start? For information on a specific command in the CLI, type the command name followed by “help”. For example:Fi

Seite 158 - Note on Public

8-56Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFigure 8-11. The Active Conf

Seite 159 - Key Index Number

8-57Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationWhen the 802.1X client’s ses

Seite 160

8-58Configuring Port-Based and Client-Based Access Control (802.1X)Messages Related to 802.1X OperationMessages Related to 802.1X OperationTable 8-4.

Seite 161

9-19Configuring and Monitoring Port SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 162 - Message Meaning

9-2Configuring and Monitoring Port SecurityOverviewOverviewNote Port security is not available on ports running at 10 Mbps or the 1000 Mbps uplinks. I

Seite 163

9-3Configuring and Monitoring Port SecurityOverviewGeneral Operation for Port Security. On a per-port basis, you can configure security measures to bl

Seite 164

9-4Configuring and Monitoring Port SecurityOverviewFigure 9-1. Example of How Port Security Controls AccessNote Broadcast and Multicast traffic is not

Seite 165

9-5Configuring and Monitoring Port SecurityPlanning Port SecurityPlanning Port Security1. Plan your port security configuration and monitoring accordi

Seite 166

9-6Configuring and Monitoring Port SecurityPort Security Command Options and OperationPort Security Command Options and OperationPort Security Command

Seite 167 - Prerequisite for Using SSL

9-7Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list >learn-mode < con

Seite 168

1-9Getting StartedNeed Only a Quick Start?To Set Up and Install the Switch in Your NetworkImportant! Use the Installation and Getting Started Guide sh

Seite 169 - Password

9-8Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list > (- Continued -)lea

Seite 170 - Password Button

9-9Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list > (- Continued -)act

Seite 171

9-10Configuring and Monitoring Port SecurityPort Security Command Options and OperationRetention of Static MAC AddressesLearned MAC AddressesIn the fo

Seite 172

9-11Configuring and Monitoring Port SecurityPort Security Command Options and OperationUsing the CLI To Display Port Security Settings. Syntax:show po

Seite 173 - Generate New Certificate

9-12Configuring and Monitoring Port SecurityPort Security Command Options and OperationThe following command example shows the option for entering a r

Seite 174 - Show host certificate command

9-13Configuring and Monitoring Port SecurityPort Security Command Options and OperationProCurve(config)# port-security a1 learn-mode static mac-addres

Seite 175

9-14Configuring and Monitoring Port SecurityPort Security Command Options and Operationmined by the current address-limit value). For example, suppose

Seite 176 - [SSL] button

9-15Configuring and Monitoring Port SecurityPort Security Command Options and OperationNote The message Inconsistent value appears if the new MAC addr

Seite 177 - Browser Interface

9-16Configuring and Monitoring Port SecurityPort Security Command Options and OperationCaution The address-limit setting controls how many MAC address

Seite 178

9-17Configuring and Monitoring Port SecurityWeb: Displaying and Configuring Port Security FeaturesThe following command serves this purpose by removin

Seite 179 - Browser Contact Behavior

1-10Getting StartedNeed Only a Quick Start?

Seite 180

9-18Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsWhen a security violation occurs on a port configured fo

Seite 181

9-19Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert Flags(by resetting the alert flag). The other entries give yo

Seite 182 - Note on Port

9-20Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsMenu: Checking for Intrusions, Listing Intrusion Alerts,

Seite 183 - Common Errors in SSL Setup

9-21Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsThe above example shows two intrusions for port A3 and o

Seite 184

9-22Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsCLI: Checking for Intrusions, Listing Intrusion Alerts,

Seite 185 - Access Control (802.1X)

9-23Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsFigure 9-12. Example of the Intrusion Log with Multiple

Seite 186

9-24Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsUsing the Event Log To Find Intrusion AlertsThe Event Lo

Seite 187

9-25Configuring and Monitoring Port SecurityOperating Notes for Port SecurityWeb: Checking for Intrusions, Listing Intrusion Alerts,and Resetting Aler

Seite 188 - User Authentication Methods

9-26Configuring and Monitoring Port SecurityOperating Notes for Port Securitythe alert flag status for the port referenced in the dropped entry. This

Seite 189

9-27Configuring and Monitoring Port SecurityConfiguring Protected PortsConfiguring Protected PortsThere are situations where you want to provide inter

Seite 190

2-12Configuring Username and Password SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 191

9-28Configuring and Monitoring Port SecurityConfiguring Protected PortsFigure 9-16. Example Showing Protected Ports and Unprotected PortsIf you displa

Seite 192 - 802.1X standard

10-110Using Authorized IP Managers ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 193

10-2Using Authorized IP ManagersOverviewOverviewAuthorized IP Manager Features The Authorized IP Managers feature uses IP addresses and masks to deter

Seite 194

10-3Using Authorized IP ManagersAccess LevelsConfiguration OptionsYou can configure: Up to 10 authorized manager addresses, where each address applie

Seite 195

10-4Using Authorized IP ManagersDefining Authorized Management StationsDefining Authorized Management Stations Authorizing Single Stations: The table

Seite 196

10-5Using Authorized IP ManagersDefining Authorized Management Stations255.255.255.252 uses the 4th octet of a given Authorized Manager IP address to

Seite 197 - Note on 802.1X

10-6Using Authorized IP ManagersDefining Authorized Management StationsFigure 10-2. Example of How To Add an Authorized Manager Entry (Continued)Editi

Seite 198 - Access Control

10-7Using Authorized IP ManagersDefining Authorized Management StationsFigure 10-3. Example of the Show IP Authorized-Manager DisplayThe above example

Seite 199

10-8Using Authorized IP ManagersDefining Authorized Management StationsSimilarly, the next command authorizes manager-level access for any station hav

Seite 200

10-9Using Authorized IP ManagersWeb: Configuring IP Authorized ManagersWeb: Configuring IP Authorized ManagersIn the web browser interface you can con

Seite 201 - Authenticators

2-2Configuring Username and Password SecurityOverviewOverviewConsole access includes both the menu interface and the CLI. There are two levels of cons

Seite 202

10-10Using Authorized IP ManagersBuilding IP MasksTable 10-1. Analysis of IP Mask for Single-Station EntriesConfiguring Multiple Stations Per Authoriz

Seite 203

10-11Using Authorized IP ManagersBuilding IP MasksTable 10-2. Analysis of IP Mask for Multiple-Station Entries Figure 10-5. Example of How the Bitmap

Seite 204

10-12Using Authorized IP ManagersOperating NotesAdditional Examples for Authorizing Multiple StationsOperating Notes Network Security Precautions: Yo

Seite 205

10-13Using Authorized IP ManagersOperating Notes• Even if you need proxy server access enabled in order to use other applications, you can still elimi

Seite 206

10-14Using Authorized IP ManagersOperating Notes

Seite 207

Index – 1IndexNumerics3DES … 6-3, 7-3802.1XSee port-based access control. …8-1802.1X access controlauthentication methods … 8-4authentication, client-

Seite 208

2 – IndexVLAN use, multiple clients … 8-7Aaaa authentication … 4-8aaa port-accessSee Web or MAC Authentication.access levels, authorized IP managers …

Seite 209

Index – 3MMAC Authenticationauthenticator operation … 3-5blocked traffic … 3-4CHAPdefined … 3-9usage … 3-4client status … 3-30configuration commands …

Seite 210 - 802.1X Open VLAN Mode

4 – IndexLACP not allowed … 8-58local … 8-23local username and password … 8-4messages … 8-58open VLANauthorized client … 8-28configuration … 8-35, 8-3

Seite 211 - VLAN Membership Priorities

Index – 5SNMP access security not supported … 5-2statistics, viewing … 5-25terminology … 5-3TLS … 5-4Web browser authentication … 5-7web-browser acces

Seite 212

2-3Configuring Username and Password SecurityOverviewTo configure password security:1. Set a Manager password pair (and an Operator password pair, if

Seite 213

6 – Indexprerequisites … 7-5remove self-signed certificate … 7-9remove server host certificate … 7-9reserved TCP port numbers … 7-20root … 7-4root cer

Seite 214

Index – 7client status … 3-30configuration commands … 3-18configuringon the switch … 3-17switch for RADIUS access … 3-15features … 3-4general setup …

Seite 217

Technical information in this document is subject to change without notice.© Copyright 2008 Hewlett-Packard Development Company, L.P. All rights reser

Seite 218

ProCurve Series 2510 SwitchesAccess Security GuideJanuary 2008

Seite 219

2-4Configuring Username and Password SecurityConfiguring Local Password SecurityConfiguring Local Password SecurityMenu: Setting PasswordsAs noted ear

Seite 220

2-5Configuring Username and Password SecurityConfiguring Local Password SecurityIf you have physical access to the switch, press and hold the Clear bu

Seite 221

2-6Configuring Username and Password SecurityConfiguring Local Password SecurityTo Remove Password Protection. Removing password protection means to

Seite 222

2-7Configuring Username and Password SecurityFront-Panel SecurityFront-Panel SecurityThe front-panel security features provide the ability to independ

Seite 223

2-8Configuring Username and Password SecurityFront-Panel SecurityAs a result of increased security concerns, customers now have the ability to stop so

Seite 224 - Only 802.1X Devices

2-9Configuring Username and Password SecurityFront-Panel SecurityReset ButtonPressing the Reset button alone for one second causes the switch to reboo

Seite 225 - 802.1X Device

2-10Configuring Username and Password SecurityFront-Panel Security3. Release the Reset button and wait for about one second for the Self-Test LED to s

Seite 226 - Other Switches

2-11Configuring Username and Password SecurityFront-Panel Security• Modify the operation of the Reset+Clear combination (page 2-9) so that the switch

Seite 227

2-12Configuring Username and Password SecurityFront-Panel SecurityFor example, show front-panel-security produces the following output when the switch

Seite 228 - Supplicant Port Configuration

2-13Configuring Username and Password SecurityFront-Panel SecurityRe-Enabling the Clear Button on the Switch’s Front Panel andSetting or Changing the

Seite 229

Hewlett-Packard Company8000 Foothills Boulevard, m/s 5551Roseville, California 95747-5551http://www.procurve.com© Copyright 2008 Hewlett-Packard Compa

Seite 230

2-14Configuring Username and Password SecurityFront-Panel SecurityFigure 2-9. Example of Re-Enabling the Clear Button’s Default OperationChanging the

Seite 231 - Statistics, and Counters

2-15Configuring Username and Password SecurityFront-Panel SecurityFigure 2-10. Example of Disabling the Factory Reset OptionPassword RecoveryThe passw

Seite 232 - ■ Auth-VLAN ID (if any)

2-16Configuring Username and Password SecurityFront-Panel SecuritySteps for Disabling Password-Recovery. 1. Set the CLI to the global interface conte

Seite 233

2-17Configuring Username and Password SecurityFront-Panel SecurityFigure 2-11. Example of the Steps for Disabling Password-RecoveryPassword Recovery P

Seite 234

2-18Configuring Username and Password SecurityFront-Panel SecurityNote The alternate password provided by the ProCurve Customer Care Center is valid o

Seite 235

3-13Web and MAC AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 236

3-2Web and MAC AuthenticationOverviewOverviewWeb and MAC Authentication are designed for employment on the “edge” of a network to provide port-based s

Seite 237 - ■ The switch reboots

3-3Web and MAC AuthenticationOverviewpassword, and grants or denies network access in the same way that it does for clients capable of interactive log

Seite 238

3-4Web and MAC AuthenticationOverviewGeneral FeaturesWeb and MAC Authentication includes the following: On a port configured for Web or MAC Authentic

Seite 239

3-5Web and MAC AuthenticationHow Web and MAC Authentication OperateHow Web and MAC Authentication OperateAuthenticator OperationBefore gaining access

Seite 240

iiiContentsProduct DocumentationAbout Your Switch Manual Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiFeature Index

Seite 241 - After the 802.1X session

3-6Web and MAC AuthenticationHow Web and MAC Authentication OperateFigure 3-2. Progress Message During AuthenticationIf the client is authenticated an

Seite 242

3-7Web and MAC AuthenticationHow Web and MAC Authentication Operatemoves have not been enabled (client-moves) on the ports, the session ends and the c

Seite 243

3-8Web and MAC AuthenticationHow Web and MAC Authentication Operate4. If neither 1, 2, or 3, above, apply, then the client session does not have acces

Seite 244

3-9Web and MAC AuthenticationTerminologyTerminologyAuthorized-Client VLAN: Like the Unauthorized-Client VLAN, this is a conventional, static, untagged

Seite 245 - Blocking Unauthorized Traffic

3-10Web and MAC AuthenticationOperating Rules and NotesOperating Rules and Notes You can configure one type of authentication on a port. That is, the

Seite 246 - Trunk Group Exclusion

3-11Web and MAC AuthenticationOperating Rules and Notes2. If there is no RADIUS-assigned VLAN, then, for the duration of the client session, the port

Seite 247 - Planning Port Security

3-12Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC AuthenticationNote on Web/MAC Authentication and LACPThe switch does not allow Web o

Seite 248

3-13Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC Authenticationc. If there is neither a RADIUS-assigned VLAN or an “Authorized VLAN”

Seite 249

3-14Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC AuthenticationAdditional Information for Configuring the RADIUSServer To Support MAC

Seite 250

3-15Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS ServerConfiguring the Switch To Access a RADIUS ServerThis section describes t

Seite 251

ivFront-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7When Security Is Important . . .

Seite 252 - Learned MAC Addresses

3-16Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS ServerFor example, to configure the switch to access a RADIUS server at IP add

Seite 253

3-17Web and MAC AuthenticationConfiguring Web AuthenticationConfiguring Web AuthenticationOverview1. If you have not already done so, configure a loca

Seite 254 - Configuring Port Security

3-18Web and MAC AuthenticationConfiguring Web AuthenticationConfigure the Switch for Web-Based AuthenticationCommand PageConfiguration Levelaaa port-a

Seite 255

3-19Web and MAC AuthenticationConfiguring Web AuthenticationSyntax: [no] aaa port-access web-based [e] < port-list>Enables web-based authenticat

Seite 256

3-20Web and MAC AuthenticationConfiguring Web AuthenticationSyntax:aaa port-access web-based [e] < port-list > [logoff-period] <60-9999999>

Seite 257

3-21Web and MAC AuthenticationConfiguring Web AuthenticationSyntax: aaa port-access web-based [e] < port-list > [redirect-url <url>]no aaa

Seite 258

3-22Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchConfiguring MAC Authentication on the SwitchOverview1. If you have not alrea

Seite 259 - Alert Flags

3-23Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchConfigure the Switch for MAC-Based AuthenticationCommand PageConfiguration L

Seite 260

3-24Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-based [e] < port-list > [addr-limit <1-

Seite 261 - Send-Disable

3-25Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-based [e] < port-list > [quiet-period <

Seite 262 - Resetting Alert Flags

v4 TACACS+ AuthenticationContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1Ov

Seite 263

3-26Web and MAC AuthenticationShow Status and Configuration of Web-Based AuthenticationShow Status and Configuration of Web-Based AuthenticationComman

Seite 264

3-27Web and MAC AuthenticationShow Status and Configuration of Web-Based AuthenticationSyntax: show port-access [port-list] web-based [config [auth-se

Seite 265

3-28Web and MAC AuthenticationShow Status and Configuration of MAC-Based AuthenticationShow Status and Configuration of MAC-Based AuthenticationComman

Seite 266

3-29Web and MAC AuthenticationShow Status and Configuration of MAC-Based AuthenticationSyntax: show port-access [port-list] mac-based [config [auth-se

Seite 267

3-30Web and MAC AuthenticationShow Client StatusShow Client StatusThe table below shows the possible client status information that may be reported by

Seite 268

4-14TACACS+ AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 269 - Configuring Protected Ports

4-2TACACS+ AuthenticationConfiguring TACACS+ on the SwitchOverviewTACACS+ authentication enables you to use a central server to allow or deny access t

Seite 270

4-3TACACS+ AuthenticationConfiguring TACACS+ on the Switchtion services. If the switch fails to connect to any TACACS+ server, it defaults to its own

Seite 271 - Using Authorized IP Managers

4-4TACACS+ AuthenticationConfiguring TACACS+ on the Switch• Local Authentication: This method uses username/password pairs configured locally on the s

Seite 272

4-5TACACS+ AuthenticationConfiguring TACACS+ on the SwitchGeneral System RequirementsTo use TACACS+ authentication, you need the following: A TACACS+

Seite 273 - Access Levels

viConfiguring the Switch for RADIUS Authentication . . . . . . . . . . . . . . . . . . 5-6Outline of the Steps for Configuring RADIUS Authentication

Seite 274 - Stations

4-6TACACS+ AuthenticationConfiguring TACACS+ on the Switchother access type (console, in this case) open in case the Telnet access fails due to a conf

Seite 275 - Managers

4-7TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Privilege LevelsWhen a TACACS+ server authenticates an access request from a switch,

Seite 276

4-8TACACS+ AuthenticationConfiguring TACACS+ on the Switchconfiguration in your TACACS+ server application for mis-configura-tions or missing data tha

Seite 277

4-9TACACS+ AuthenticationConfiguring TACACS+ on the SwitchCLI Commands Described in this SectionViewing the Switch’s Current Authentication Configurat

Seite 278

4-10TACACS+ AuthenticationConfiguring TACACS+ on the SwitchViewing the Switch’s Current TACACS+ ServerContact ConfigurationThis command lists the time

Seite 279 - Building IP Masks

4-11TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s Authentication MethodsThe aaa authentication command configures th

Seite 280 - IP Entry

4-12TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-1. AAA Authentication ParametersAs shown in the next table, login and enable access

Seite 281

4-13TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-2. Primary/Secondary Authentication TableCaution Regarding the Use of Local for Log

Seite 282 - Operating Notes

4-14TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, here is a set of access options and the corresponding commands to configure th

Seite 283

4-15TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s TACACS+ Server AccessThe tacacs-server command configures these pa

Seite 284

vii4. Enable SSH on the Switch and Anticipate SSHClient Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-

Seite 285 - See also port based

4-16TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Encryption KeysEncryption keys configured in the switch must exactly match the encr

Seite 286 - 2 – Index

4-17TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-3. Details on Configuring TACACS Servers and KeysName Default Rangetacacs-server

Seite 287 - Index – 3

4-18TACACS+ AuthenticationConfiguring TACACS+ on the SwitchAdding, Removing, or Changing the Priority of a TACACS+ Server. Suppose that the switch was

Seite 288 - 4 – Index

4-19TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFigure 4-5. Example of the Switch After Assigning a Different “First-Choice” ServerTo remov

Seite 289 - Index – 5

4-20TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTo delete a per-server encryption key in the switch, re-enter the tacacs-server host comman

Seite 290 - 6 – Index

4-21TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFigure 4-6. Using a TACACS+ Server for AuthenticationUsing figure 4-6, above, after either

Seite 291 - Index – 7

4-22TACACS+ AuthenticationConfiguring TACACS+ on the SwitchLocal Authentication ProcessWhen the switch is configured to use TACACS+, it reverts to loc

Seite 292 - 8 – Index

4-23TACACS+ AuthenticationConfiguring TACACS+ on the SwitchUsing the Encryption KeyGeneral OperationWhen used, the encryption key (sometimes termed “k

Seite 293

4-24TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, you would use the next command to configure a global encryp-tion key in the sw

Seite 294

4-25TACACS+ AuthenticationConfiguring TACACS+ on the SwitchMessages Related to TACACS+ OperationThe switch generates the CLI messages listed below. Ho

Kommentare zu diesen Handbüchern

Keine Kommentare