ProCurve 6200yl User's Guide

Browse online or download User's Guide for Network switches ProCurve 6200yl. ProCurve 6200yl Product guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Access Security Guide
6200yl
5400zl
3500yl
www.procurve.com
ProCurve Switches
K.12.XX
Page view 0
1 2 3 4 5 6 ... 595 596

Summary of Contents

Page 1 - ProCurve Switches

Access Security Guide6200yl5400zl3500ylwww.procurve.comProCurve SwitchesK.12.XX

Page 2

viiiConfiguring the Switch for RADIUS Authentication . . . . . . . . . . . . . 6-8Outline of the Steps for Configuring RADIUS Authentication . . .

Page 3 - 6200yl Switch

4-8Web and MAC AuthenticationHow Web and MAC Authentication Operate4. If neither 1, 2, or 3, above, apply, then the client session does not have acces

Page 4 - Hewlett-Packard Company

4-9Web and MAC AuthenticationTerminologyTerminologyAuthorized-Client VLAN: Like the Unauthorized-Client VLAN, this is a conventional, static, untagged

Page 5

4-10Web and MAC AuthenticationOperating Rules and NotesOperating Rules and Notes The switch supports concurrent 802.1X and either Web- or MAC-authent

Page 6

4-11Web and MAC AuthenticationOperating Rules and Notes• During an authenticated client session, the following hierarchy deter-mines a port’s VLAN mem

Page 7 - 3 Virus Throttling

4-12Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC Authentication Web- or MAC-based authentication and LACP cannot both be enabled on

Page 8 - 5 TACACS+ Authentication

4-13Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC Authenticationc. If there is neither a RADIUS-assigned VLAN or an “Authorized VLAN”

Page 9

4-14Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS Server Configure the client device’s (hexadecimal) MAC address as both userna

Page 10

4-15Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS ServerSyntax: [no] radius-server[host < ip-address >]Adds a server to th

Page 11

4-16Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS ServerFor example, to configure the switch to access a RADIUS server at IP add

Page 12

4-17Web and MAC AuthenticationConfiguring Web Authentication on the SwitchConfiguring Web Authentication on the SwitchOverview1. If you have not alrea

Page 13

ix7 Configuring RADIUS Server Supportfor Switch ServicesContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 14

4-18Web and MAC AuthenticationConfiguring Web Authentication on the SwitchConfigure the Switch for Web-Based AuthenticationCommand PageConfiguration L

Page 15

4-19Web and MAC AuthenticationConfiguring Web Authentication on the SwitchSyntax: [no] aaa port-access web-based [e] < port-list>Enables web-bas

Page 16

4-20Web and MAC AuthenticationConfiguring Web Authentication on the SwitchSyntax:aaa port-access web-based [e] < port-list > [logoff-period] <

Page 17 - 13 Configuring Port-Based and

4-21Web and MAC AuthenticationConfiguring Web Authentication on the SwitchSyntax: aaa port-access web-based [e] < port-list > [redirect-url <

Page 18

4-22Web and MAC AuthenticationConfiguring Web Authentication on the SwitchSyntax: aaa port-access web-based [e] < port-list > [unauth-vid <vi

Page 19

4-23Web and MAC AuthenticationConfiguring Web Authentication on the SwitchSyntax: aaa port-access <port-list > controlled-directions <both |

Page 20 - 16 Key Management System

4-24Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchConfiguring MAC Authentication on the SwitchOverview1. If you have not alrea

Page 21 - Product Documentation

4-25Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchConfigure the Switch for MAC-Based AuthenticationCommand PageConfiguration L

Page 22 - Software Feature Index

4-26Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-based [e] < port-list > [addr-limit <1-

Page 23 - Features

4-27Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-based [e] < port-list > [quiet-period <

Page 24

xPublic Key Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5Steps for Configuring and Using SSHfor

Page 25

4-28Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchShow Commands for Web-Based AuthenticationCommand Pageshow port-access [port

Page 26

4-29Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchExample: Verifying a Web Authentication ConfigurationThe following example s

Page 27 - Security Overview

4-30Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchFigure 4-5. Example of Verifying a Web Authentication ConfigurationProCurve

Page 28 - Introduction

4-31Web and MAC AuthenticationConfiguring MAC AuthenticationConfiguring MAC AuthenticationConfiguration Overview1. If you have not already done so, co

Page 29 - Switch Access Security

4-32Web and MAC AuthenticationConfiguring MAC AuthenticationSyntax: aaa port-access mac-based addr-format <no-delimiter|single-dash|multi-dash|mult

Page 30

4-33Web and MAC AuthenticationConfiguring MAC AuthenticationSyntax: aaa port-access mac-based [e] < port-list > [auth-vid <vid>]no aaa por

Page 31 - Access to

4-34Web and MAC AuthenticationConfiguring MAC AuthenticationSyntax: aaa port-access mac-based [e] < port-list > [server-timeout <1 - 300>]

Page 32 - Secure File Transfers

4-35Web and MAC AuthenticationConfiguring MAC AuthenticationPrerequisites: As implemented in 802.1X authentica-tion, the disabling of incoming traffic

Page 33 - RADIUS Authentication

4-36Web and MAC AuthenticationConfiguring MAC AuthenticationShow Commands for MAC-Based AuthenticationNotes: — Continued — Using the aaa port-access

Page 34 - Network Security Features

4-37Web and MAC AuthenticationConfiguring MAC AuthenticationSyntax: show port-access [port-list] mac-based [clients]]Shows the port address, MAC addre

Page 35 - Secure Shell (SSH)

xiGenerate a CA-Signed server host certificate with theWeb browser interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-

Page 36 - Traffic/Security Filters

4-38Web and MAC AuthenticationConfiguring MAC AuthenticationExample: Verifying a MAC Authentication ConfigurationThe following example shows how to us

Page 37

4-39Web and MAC AuthenticationClient StatusClient StatusThe table below shows the possible client status information that may be reported by a Web-bas

Page 38 - Advanced Threat Detection

4-40Web and MAC AuthenticationClient Status— This page is intentionally unused —

Page 39 - Identity-Driven Manager (IDM)

5-15TACACS+ AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 40

5-2TACACS+ AuthenticationOverviewOverviewTACACS+ authentication enables you to use a central server to allow or deny access to the switches covered in

Page 41

5-3TACACS+ AuthenticationTerminology Used in TACACS Applications:TACACS+ server for authentication services. If the switch fails to connect to any TAC

Page 42

5-4TACACS+ AuthenticationTerminology Used in TACACS Applications:face. (Using the menu interface you can assign a local password, but not a username.)

Page 43

5-5TACACS+ AuthenticationGeneral System RequirementsGeneral System RequirementsTo use TACACS+ authentication, you need the following: A TACACS+ serve

Page 44

5-6TACACS+ AuthenticationGeneral Authentication Setup Procedureother access type (console, in this case) open in case the Telnet access fails due to a

Page 45 - Menu: Setting Passwords

5-7TACACS+ AuthenticationGeneral Authentication Setup ProcedureNote on Privilege LevelsWhen a TACACS+ server authenticates an access request from a sw

Page 46

xiiWhat Is the Difference Between Network (or Subnet)Masks and the Masks Used with ACLs? . . . . . . . . . . . . . . . . . . . 10-36Rules for Defini

Page 47

5-8TACACS+ AuthenticationConfiguring TACACS+ on the Switchconfiguration in your TACACS+ server application for mis-configura-tions or missing data tha

Page 48 - Front-Panel Security

5-9TACACS+ AuthenticationConfiguring TACACS+ on the SwitchCLI Commands Described in this SectionViewing the Switch’s Current Authentication Configurat

Page 49 - When Security Is Important

5-10TACACS+ AuthenticationConfiguring TACACS+ on the SwitchViewing the Switch’s Current TACACS+ Server Contact ConfigurationThis command lists the tim

Page 50 - Front-Panel Button Functions

5-11TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s Authentication MethodsThe aaa authentication command configures th

Page 51 - Reset Button

5-12TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 5-1. AAA Authentication ParametersAs shown in the next table, login and enable access

Page 52

5-13TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 5-2. Primary/Secondary Authentication TableCaution Regarding the Use of Local for Log

Page 53

5-14TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, here is a set of access options and the corresponding commands to configure th

Page 54

5-15TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s TACACS+ Server AccessThe tacacs-server command configures these pa

Page 55

5-16TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Encryption KeysEncryption keys configured in the switch must exactly match the encr

Page 56

5-17TACACS+ AuthenticationConfiguring TACACS+ on the Switch Name Default Rangehost <ip-addr> [key <key-string> none n/aSpecifies the IP a

Page 57

xiiiSequence Numbering in ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-87Inserting an ACE in an Existing ACL . . . . . . . .

Page 58 - Password Recovery

5-18TACACS+ AuthenticationConfiguring TACACS+ on the SwitchAdding, Removing, or Changing the Priority of a TACACS+ Server. Suppose that the switch was

Page 59 - [N] (for “No”)

5-19TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFigure 5-5. Example of the Switch After Assigning a Different “First-Choice” ServerTo remov

Page 60 - Password Recovery Process

5-20TACACS+ AuthenticationHow Authentication OperatesTo delete a per-server encryption key in the switch, re-enter the tacacs-server host command with

Page 61 - Virus Throttling

5-21TACACS+ AuthenticationHow Authentication OperatesUsing figure 5-6, above, after either switch detects an operator’s logon request from a remote or

Page 62

5-22TACACS+ AuthenticationHow Authentication OperatesLocal Authentication ProcessWhen the switch is configured to use TACACS+, it reverts to local aut

Page 63

5-23TACACS+ AuthenticationHow Authentication OperatesUsing the Encryption KeyGeneral OperationWhen used, the encryption key (sometimes termed “key”, “

Page 64 - Features and Benefits

5-24TACACS+ AuthenticationControlling Web Browser Interface Access When Using TACACS+ AuthenticationFor example, you would use the next command to con

Page 65 - General Operation

5-25TACACS+ AuthenticationMessages Related to TACACS+ OperationMessages Related to TACACS+ OperationThe switch generates the CLI messages listed below

Page 66 - Application Options

5-26TACACS+ AuthenticationOperating Notes When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ servers are not acce

Page 67 - Operating Rules

6-16RADIUS Authentication and AccountingContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 68

xivChanging the Remote-id from a MAC to an IP Address . . . . . . 11-10Disabling the MAC Address Check . . . . . . . . . . . . . . . . . . . . . .

Page 69

6-2RADIUS Authentication and AccountingContentsExample Configuration on Cisco Secure ACS for MS Windows 6-28Example Configuration Using FreeRADIUS .

Page 70

6-3RADIUS Authentication and AccountingOverviewOverviewRADIUS (Remote Authentication Dial-In User Service) enables you to use up to three servers (one

Page 71 - Sensitivity

6-4RADIUS Authentication and AccountingOverviewNote The switch does not support RADIUS security for SNMP (network manage-ment) access. For information

Page 72

6-5RADIUS Authentication and AccountingTerminologyTerminologyAAA: Authentication, Authorization, and Accounting groups of services pro-vided by the ca

Page 73

6-6RADIUS Authentication and AccountingSwitch Operating Rules for RADIUSVendor-Specific Attribute: A vendor-defined value configured in a RADIUS serve

Page 74

6-7RADIUS Authentication and AccountingGeneral RADIUS Setup ProcedureGeneral RADIUS Setup ProcedurePreparation:1. Configure one to three RADIUS server

Page 75

6-8RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationConfiguring the Switch for RADIUS Authentication• Determine how

Page 76

6-9RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationOutline of the Steps for Configuring RADIUS AuthenticationThere

Page 77

6-10RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication• Timeout Period: The timeout period the switch waits for a RA

Page 78

6-11RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authenticationradius (or tacacs) for primary authentication, you must config

Page 79 - Connection-Rate ACLs

xvUsing Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . 12-9Static Multicast Filters . . . . . . . . . . . . . . . . .

Page 80 - Connection-Rate ACL Operation

6-12RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication2. Enable the (Optional) Access Privilege OptionIn the default

Page 81 - Source IP Address Criteria

6-13RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication 3. Configure the Switch To Access a RADIUS ServerThis section

Page 82

6-14RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have configured the switch as shown i

Page 83 - Criteria

6-15RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFigure 6-3. Sample Configuration for RADIUS Server Before Chan

Page 84

6-16RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication Global server key: The server key the switch will use for co

Page 85

6-17RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationNote Where the switch has multiple RADIUS servers configured t

Page 86 - Applying Connection-Rate ACLs

6-18RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFigure 6-6. Listings of Global RADIUS Parameters Configured In

Page 87

6-19RADIUS Authentication and AccountingUsing SNMP To View and Configure Switch Authentication FeaturesUsing SNMP To View and Configure Switch Authent

Page 88

6-20RADIUS Authentication and AccountingUsing SNMP To View and Configure Switch Authentication Features2c access. (Refer to “Switch Access Security” o

Page 89

6-21RADIUS Authentication and AccountingUsing SNMP To View and Configure Switch Authentication FeaturesFigure 6-7. Disabling SNMP Access to the Authen

Page 90

xviA. Enable the Selected Ports as Authenticators and Enablethe (Default) Port-Based Authentication . . . . . . . . . . . . . . . . . . 13-17B. Spe

Page 91

6-22RADIUS Authentication and AccountingLocal Authentication ProcessLocal Authentication ProcessWhen the switch is configured to use RADIUS, it revert

Page 92

6-23RADIUS Authentication and AccountingControlling Web Browser Interface AccessControlling Web Browser Interface AccessTo help prevent unauthorized a

Page 93

6-24RADIUS Authentication and AccountingConfiguring RADIUS AuthorizationConfiguring RADIUS AuthorizationOverviewYou can limit the services for a user

Page 94

6-25RADIUS Authentication and AccountingConfiguring RADIUS AuthorizationEnabling Authorization with the CLITo configure authorization for controlling

Page 95 - General Features

6-26RADIUS Authentication and AccountingConfiguring RADIUS AuthorizationShowing Authorization InformationYou can show the authorization information by

Page 96

6-27RADIUS Authentication and AccountingConfiguring RADIUS AuthorizationThe results of using the HP-Command-String and HP-Command-Exception attributes

Page 97 - Authenticator Operation

6-28RADIUS Authentication and AccountingConfiguring RADIUS AuthorizationExample Configuration on Cisco Secure ACS for MS WindowsIt is necessary to cre

Page 98

6-29RADIUS Authentication and AccountingConfiguring RADIUS AuthorizationProfile=IN OUTEnums=Hp-Command-Exception-Types[Hp-Command-Exception-Types]0=Pe

Page 99 - MAC-based Authentication

6-30RADIUS Authentication and AccountingConfiguring RADIUS Authorization6. Right click and then select New > key. Add the vendor Id number that you

Page 100 - Web and MAC Authentication

6-31RADIUS Authentication and AccountingConfiguring RADIUS Authorization2. Find the location of the dictionary files used by FreeRADIUS (try /usr/loca

Page 101 - Terminology

xviiOperating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-60Messages Related to 802.1X Operatio

Page 102 - Operating Rules and Notes

6-32RADIUS Authentication and AccountingConfiguring RADIUS AccountingConfiguring RADIUS AccountingNote This section assumes you have already: Configu

Page 103

6-33RADIUS Authentication and AccountingConfiguring RADIUS Accounting Exec accounting: Provides records holding the information listed below about lo

Page 104 - Authentication

6-34RADIUS Authentication and AccountingConfiguring RADIUS Accounting If access to a RADIUS server fails during a session, but after the client has b

Page 105

6-35RADIUS Authentication and AccountingConfiguring RADIUS Accounting1. Configure the Switch To Access a RADIUS ServerBefore you configure the actual

Page 106 - RADIUS Server

6-36RADIUS Authentication and AccountingConfiguring RADIUS AccountingFor example, suppose you want to the switch to use the RADIUS server described be

Page 107

6-37RADIUS Authentication and AccountingConfiguring RADIUS AccountingNote that there is no time span associated with using the system option. It simpl

Page 108

6-38RADIUS Authentication and AccountingConfiguring RADIUS AccountingFor example, to configure RADIUS accounting on the switch with start-stop for exe

Page 109 - Overview

6-39RADIUS Authentication and AccountingConfiguring RADIUS AccountingTo continue the example in figure 6-11, suppose that you wanted the switch to: S

Page 110

6-40RADIUS Authentication and AccountingViewing RADIUS StatisticsViewing RADIUS StatisticsGeneral RADIUS StatisticsFigure 6-13. Example of General RAD

Page 111

6-41RADIUS Authentication and AccountingViewing RADIUS StatisticsFigure 6-14. RADIUS Server Information From the Show Radius Host CommandTerm Definiti

Page 113

xviiiOperating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-4215 Using Authorized IP Managers Contents . . . .

Page 114

6-42RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Authentication StatisticsFigure 6-15. Example of Login Attempt and Primary/Sec

Page 115

6-43RADIUS Authentication and AccountingViewing RADIUS StatisticsFigure 6-16. Example of RADIUS Authentication Information from a Specific ServerRADIU

Page 116

6-44RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderFigure 6-18. Example of RADIUS Accounting Information for a Specific Server

Page 117

6-45RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderFigure 6-20. Search Order for Accessing a RADIUS ServerTo exchange the posi

Page 118

6-46RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderFigure 6-21. Example of New RADIUS Server Search OrderRemoves the “003” and

Page 119

6-47RADIUS Authentication and AccountingMessages Related to RADIUS OperationMessages Related to RADIUS OperationMessage MeaningCan’t reach RADIUS serv

Page 120

6-48RADIUS Authentication and AccountingMessages Related to RADIUS Operation— This page is intentionally unused —

Page 121

7-17Configuring RADIUS Server Supportfor Switch ServicesContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 122

7-2Configuring RADIUS Server Support for Switch ServicesOverviewOverviewThis chapter provides information that applies to setting up a RADIUS server t

Page 123 - Configuration Overview

7-3Configuring RADIUS Server Support for Switch ServicesConfiguring the RADIUS Server for Per-Port CoS and Rate-Limiting ServicesConfiguring the RADIU

Page 124

xixProduct DocumentationAbout Your Switch Manual SetNote For the latest version of all ProCurve switch documentation, including Release Notes covering

Page 125

7-4Configuring RADIUS Server Support for Switch ServicesConfiguring the RADIUS Server for Per-Port CoS and Rate-Limiting ServicesViewing the Currently

Page 126

7-5Configuring RADIUS Server Support for Switch ServicesConfiguring the RADIUS Server for Per-Port CoS and Rate-Limiting ServicesFigure 7-1. Example o

Page 127

7-6Configuring RADIUS Server Support for Switch ServicesConfiguring the RADIUS Server for Per-Port CoS and Rate-Limiting ServicesFigure 7-2. Example o

Page 128

7-7Configuring RADIUS Server Support for Switch ServicesConfiguring the RADIUS Server for Per-Port CoS and Rate-Limiting ServicesNote Where multiple c

Page 129

7-8Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsConfiguring and Using RADIUS-Assigne

Page 130

7-9Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Lists• RACL: an ACL assigned to filter ro

Page 131 - Client Status

7-10Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Listsby other ACEs configured sequential

Page 132

7-11Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsOverview of RADIUS-Assigned, Dynami

Page 133 - TACACS+ Authentication

7-12Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsNote A dynamic port ACL can be appl

Page 134

7-13Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsContrasting Dynamic and Static ACLs

Page 135 - Applications:

xxSoftware Feature IndexFor the software manual set supporting your 3500yl/5400zl/6200yl switch model, this feature index indicates which manual to co

Page 136

7-14Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsCaution Regarding the Use of Source

Page 137 - General System Requirements

7-15Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsHow a RADIUS Server Applies a Dynam

Page 138

7-16Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsGeneral ACL Features, Planning, and

Page 139 - Privilege Levels

7-17Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsNote If a dynamic port ACL permits

Page 140 - Before You Begin

7-18Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Listswas also configured on VLAN “Y”, th

Page 141 - Configuration

7-19Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Lists(Note that the “string” value and t

Page 142 - Server Contact Configuration

7-20Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Listsautomatically includes an implicit

Page 143

7-21Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsAny instance of a dynamic port ACL

Page 144

7-22Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsConfiguration NotesExplicitly Permi

Page 145 - Login Primary

7-23Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Listsare not explicitly denied, you must

Page 146

xxiAAA Authentication XAuthorized IP Managers XAuthorized Manager List (Web, Telnet, TFTP) XAuto MDIX Configuration XBOOTP XConfig File XConsole Acces

Page 147

7-24Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsConfiguring the Switch To Support D

Page 148 - Encryption Keys

7-25Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsMAC Authentication Option:Syntax: a

Page 149

7-26Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsFigure 7-7. Example Showing a Dynam

Page 150 - First-Choice TACACS+ Server

7-27Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsSyntax: show port-access authentica

Page 151

7-28Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsFigure 7-8. Example of Output Showi

Page 152 - How Authentication Operates

7-29Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control ListsCauses of Client Deauthentication I

Page 153

7-30Configuring RADIUS Server Support for Switch ServicesConfiguring and Using RADIUS-Assigned Access Control Listssubscribed, new RADIUS-based sessio

Page 154 - Local Authentication Process

8-18 Configuring Secure Shell (SSH)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 155 - Using the Encryption Key

8-2Configuring Secure Shell (SSH)OverviewOverviewThe switches covered in this guide use Secure Shell version 2 (SSHv2) to provide remote access to man

Page 156 - Access When Using TACACS+

8-3Configuring Secure Shell (SSH)TerminologyNote SSH in ProCurve switches is based on the OpenSSH software toolkit. For more information on OpenSSH, v

Page 157 - Operating Notes

xxiiGVRP XIdentity-Driven Management (IDM) XIGMP XInterface Access (Telnet, Console/Serial, Web) XIP Addressing XIP Routing XJumbo Packets XLACP XLink

Page 158

8-4Configuring Secure Shell (SSH)Terminology PEM (Privacy Enhanced Mode): Refers to an ASCII-formatted client public-key that has been encoded for po

Page 159 - Contents

8-5Configuring Secure Shell (SSH)Prerequisite for Using SSHPrerequisite for Using SSHBefore using the switch as an SSH server, you must install a publ

Page 160

8-6Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationSteps for Configuring and Using SSHfor Switch

Page 161

8-7Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationB. Switch Preparation1. Assign a login (Opera

Page 162 - Configuration MIB

8-8Configuring Secure Shell (SSH)General Operating Rules and NotesGeneral Operating Rules and Notes Public keys generated on an SSH client must be ex

Page 163

8-9Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationConfiguring the Switch for SSH Operation1. Assigning a Local Login (Operator)

Page 164

8-10Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 8-4. Example of Configuring Local Passwords2. Generating the Switch’s

Page 165

8-11Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationNotes When you generate a host key pair on the switch, the switch places the

Page 166

8-12Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFor example, to generate and display a new key:Figure 8-5. Example of Genera

Page 167

8-13Configuring Secure Shell (SSH)Configuring the Switch for SSH Operationdistribution to clients is to use a direct, serial connection between the sw

Page 168 - You Want RADIUS To Protect

xxiiiPort Configuration XPort Monitoring XPort Security XPort Status XPort Trunking (LACP) XPort-Based Access Control (802.1X) XPower over Ethernet (P

Page 169

8-14Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation4. Add any data required by your SSH client application. For example Before

Page 170

8-15Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 8-9. Examples of Visual Phonetic and Hexadecimal Conversions of the S

Page 171

8-16Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationSSH Client Contact Behavior. At the first contact between the switch and an

Page 172

8-17Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation Zeroize the switch’s existing key pair. (page 8-11).The ip ssh key-size co

Page 173

8-18Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationCaution Protect your private key file from access by anyone other than yours

Page 174

8-19Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationOption B: Configuring the Switch for Client Public-Key SSH Authentication.

Page 175

8-20Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFor example, assume that you have a client public-key file named Client-Keys

Page 176

8-21Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 8-12 shows how to check the results of the above commands.Figure 8-12

Page 177

8-22Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFurther Information on SSH Client Public-Key Authenticati

Page 178

8-23Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key Authentication3. If there is not a match, and you have not configured t

Page 179 - (hpSwitchAuth) is disabled

xxivSSL (Secure Socket Layer) XStack Management (3500yl/6200yl switches only) XSyslog XSystem Information XTACACS+ Authentication XTelnet Access XTFTP

Page 180

8-24Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationNotes Comments in public key files, such as smith@support

Page 181

8-25Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationNote on Public KeysThe actual content of a public key ent

Page 182 - Commands Authorization Type

8-26Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFor example, if you wanted to copy a client public-key fi

Page 183

8-27Configuring Secure Shell (SSH)Messages Related to SSH OperationCaution To enable client public-key authentication to block SSH clients whose publi

Page 184 - Configuring the RADIUS Server

8-28Configuring Secure Shell (SSH)Messages Related to SSH OperationDownload failed: overlength key in key file.Download failed: too many keys in key f

Page 185

9-19Configuring Secure Socket Layer (SSL)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 186

9-2Configuring Secure Socket Layer (SSL)OverviewOverviewThe switches covered in this guide use Secure Socket Layer Version 3 (SSLv3) and support for

Page 187

9-3Configuring Secure Socket Layer (SSL)TerminologyFigure 9-1. Switch/User AuthenticationSSL on the switches covered in this guide supports these data

Page 188

9-4Configuring Secure Socket Layer (SSL)Terminology Root Certificate: A trusted certificate used by certificate authorities to sign certificates (CA-

Page 189

9-5Configuring Secure Socket Layer (SSL)Prerequisite for Using SSLPrerequisite for Using SSLBefore using the switch as an SSL server, you must install

Page 190 - Configuring RADIUS Accounting

1-1Security OverviewContents1Security OverviewContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 191

9-6Configuring Secure Socket Layer (SSL)General Operating Rules and NotesGeneral Operating Rules and Notes Once you generate a certificate on the swi

Page 192

9-7Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationConfiguring the Switch for SSL Operation1. Assigning a Local Login (Op

Page 193

9-8Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationUsing the web browser interface To Configure Local Passwords. You can

Page 194

9-9Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL Operation2. Generating the Switch’s Server Host Certificate You must generate a

Page 195

9-10Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationTo Generate or Erase the Switch’s Server Certificatewith the CLIBecau

Page 196 - Interim Updating Options

9-11Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationComments on certificate fields. There are a number arguments used in

Page 197

9-12Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationNotes “Zeroizing” the switch’s server host certificate or key automat

Page 198 - Viewing RADIUS Statistics

9-13Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationGenerate a Self-Signed Host Certificate with the Web browser interfac

Page 199

9-14Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationFor example, to generate a new host certificate via the web browsers

Page 200

9-15Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationFigure 9-6. Web browser Interface showing current SSL Host Certificat

Page 201 - RADIUS Accounting Statistics

1-2Security OverviewIntroductionIntroductionBefore you connect your switch to a network, ProCurve strongly recommends that you review the Security Ove

Page 202

9-16Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationThe installation of a CA-signed certificate involves interaction with

Page 203

9-17Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL Operation Figure 9-7. Request for Verified Host Certificate Web Browser Interf

Page 204

9-18Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationNote Before enabling SSL on the switch you must generate the switch’s

Page 205 - as both the primary

9-19Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationUsing the CLI interface to enable SSLTo enable SSL on the switch1. Ge

Page 206

9-20Configuring Secure Socket Layer (SSL)Configuring the Switch for SSL OperationFigure 9-8. Using the web browser interface to enable SSL and select

Page 207

9-21Configuring Secure Socket Layer (SSL)Common Errors in SSL setup

Page 208

9-22Configuring Secure Socket Layer (SSL)Common Errors in SSL setup— This page is intentionally unused —

Page 209

10-110Access Control Lists (ACLs)Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 210

10-2Access Control Lists (ACLs)ContentsConfiguring and Assigning an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-41Overview . . . .

Page 211

10-3Access Control Lists (ACLs)ContentsAttaching a Remark to an ACE . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-92Operating Notes for Re

Page 212

1-3Security OverviewSwitch Access SecuritySwitch Access SecurityThis section outlines provisions for protecting access to the switch’s status informat

Page 213

10-4Access Control Lists (ACLs)IntroductionIntroductionAn Access Control List (ACL) is a list of one or more Access Control Entries (ACEs) specifying

Page 214 - Configuring and Using

10-5Access Control Lists (ACLs)Overview of Options for Applying ACLs on the SwitchOverview of Options for Applying ACLs on the SwitchTo apply ACL filt

Page 215

10-6Access Control Lists (ACLs)Overview of Options for Applying ACLs on the SwitchNote This chapter describes the ACL applications you can statically

Page 216

10-7Access Control Lists (ACLs)Overview of Options for Applying ACLs on the SwitchDelete a Standard ACL ProCurve(config)# no ip access-list standard &

Page 217

10-8Access Control Lists (ACLs)Overview of Options for Applying ACLs on the SwitchTable 10-2. Command Summary for Extended ACLsAction Command(s) PageC

Page 218

10-9Access Control Lists (ACLs)Overview of Options for Applying ACLs on the SwitchTable 10-3. Command Summary for Enabling, Disabling, and Displaying

Page 219

10-10Access Control Lists (ACLs)TerminologyTerminologyAccess Control Entry (ACE): A policy consisting of criteria and an action (permit or deny) to ex

Page 220

10-11Access Control Lists (ACLs)TerminologyACL: See “Access Control List”.ACL ID: A number or alphanumeric string used to identify an ACL. A standard

Page 221

10-12Access Control Lists (ACLs)Terminologyidentifier: The term used in ACL syntax statements to represent either the name or number by which the ACL

Page 222 - The Packet-filtering Process

10-13Access Control Lists (ACLs)TerminologyNamed ACL: An ACL created with the ip access-list < extended | standard > < name-str > command

Page 223

ProCurveSeries 5400zl SwitchesSeries 3500yl Switches6200yl SwitchAccess Security GuideFebruary 2007K.12.XX

Page 224 - ■ vendor and ACL identifiers:

1-4Security OverviewSwitch Access SecurityInbound Telnet Access and Web Browser AccessThe default remote management protocols enabled on the switch ar

Page 225

10-14Access Control Lists (ACLs)Terminologyseq-#: The term used in ACL syntax statements to represent the sequence number variable used to insert an A

Page 226

10-15Access Control Lists (ACLs)OverviewOverviewTypes of IP ACLsA permit or deny policy for IP traffic you want to filter can be based on source IP ad

Page 227

10-16Access Control Lists (ACLs)Overview• outbound traffic generated by the switch itself. VLAN ACL (VACL): on a VLAN configured with a VACL, any inb

Page 228 - Configuration Notes

10-17Access Control Lists (ACLs)OverviewFigure 10-1. Example of RACL Filter Applications on Routed IP TrafficNotes The switch allows one inbound RACL

Page 229 - ACEs in the list

10-18Access Control Lists (ACLs)OverviewVACL ApplicationsVACLs filter any IP traffic entering the switch on a VLAN configured with the “VLAN” ACL opti

Page 230

10-19Access Control Lists (ACLs)OverviewStatic Port ACL and Dynamic Port ACL Applications Static Port ACL: filters any IP traffic inbound on the desi

Page 231

10-20Access Control Lists (ACLs)Overview802.1X User-Based and Port-Based Applications. User-Based 802.1X access control allows up to 32 individually

Page 232

10-21Access Control Lists (ACLs)Overview One inbound and one outbound RACL filtering routed IP traffic moving through the port for VLAN “X”. (Also ap

Page 233

10-22Access Control Lists (ACLs)Overview An RACL that denies inbound IP traffic having a destination on the 10.28.10.0 subnetIn this case, no IP traf

Page 234 - Event Log Messages

10-23Access Control Lists (ACLs)Overview You can apply any one ACL to multiple interfaces. All ACEs in an ACL configured on the switch are automatic

Page 235 - Monitoring Shared Resources

1-5Security OverviewSwitch Access Securityyou enable SNMP version 3 for improved security. SNMPv3 includes the ability to configure restricted access

Page 236

10-24Access Control Lists (ACLs)OverviewGeneral Steps for Planning and Configuring ACLs1. Identify the ACL application to apply. As part of this step

Page 237

10-25Access Control Lists (ACLs)Overview5. Assign the ACLs to the interfaces you want to filter, using the ACL application (static port ACL, VACL, or

Page 238

10-26Access Control Lists (ACLs)ACL OperationACL OperationIntroductionAn ACL is a list of one or more Access Control Entries (ACEs), where each ACE co

Page 239

10-27Access Control Lists (ACLs)ACL OperationNote After you assign an ACL to an interface, the default action on the interface is to implicitly deny a

Page 240

10-28Access Control Lists (ACLs)ACL Operationno further comparisons of the packet are made with the remaining ACEs in the list. This means that when a

Page 241 - Public Key Formats

10-29Access Control Lists (ACLs)ACL OperationNote The order in which an ACE occurs in an ACL is significant. For example, if an ACL contains six ACEs,

Page 242

10-30Access Control Lists (ACLs)Planning an ACL ApplicationIt is important to remember that all ACLs configurable on the switch include an implicit de

Page 243

10-31Access Control Lists (ACLs)Planning an ACL Application Any TCP traffic (only) for a specific TCP port or range of ports, including optional cont

Page 244

10-32Access Control Lists (ACLs)Planning an ACL ApplicationSecurityACLs can enhance security by blocking IP traffic carrying an unauthorized source IP

Page 245

10-33Access Control Lists (ACLs)Planning an ACL ApplicationAccess Control Entries (ACEs) in the ACL, beginning with the first ACE in the list and proc

Page 246

1-6Security OverviewSwitch Access SecurityFor details on this feature, refer to the section titled “Using SNMP To View and Configure Switch Authentica

Page 247

10-34Access Control Lists (ACLs)Planning an ACL Application• Numeric Standard ACLs: Up to 99; numeric range: 1 - 99 • Numeric Extended ACLs: Up to 100

Page 248 - Key for the

10-35Access Control Lists (ACLs)Planning an ACL Application VACLs: These filter any IP traffic entering the switch through any port belonging to the

Page 249 - Modulus <n>

10-36Access Control Lists (ACLs)Planning an ACL ApplicationHow an ACE Uses a Mask To Screen Packets for MatchesWhen the switch applies an ACL to IP tr

Page 250

10-37Access Control Lists (ACLs)Planning an ACL ApplicationRules for Defining a Match Between a Packet and anAccess Control Entry (ACE) For a given A

Page 251 - Client Contact Behavior

10-38Access Control Lists (ACLs)Planning an ACL Application Every IP address and mask pair (source or destination) used in an ACE creates one of the

Page 252 - ■ Execute no ip ssh

10-39Access Control Lists (ACLs)Planning an ACL ApplicationExample of How the Mask Bit Settings Define a Match . Assume an ACE where the second octet

Page 253 - Note on Port

10-40Access Control Lists (ACLs)Planning an ACL ApplicationExamples Allowing Multiple IP Addresses. Table 10-5 provides exam-ples of how to apply mas

Page 254

10-41Access Control Lists (ACLs)Configuring and Assigning an ACLConfiguring and Assigning an ACL OverviewGeneral Steps for Implementing ACLs1. Configu

Page 255

10-42Access Control Lists (ACLs)Configuring and Assigning an ACLOptions for Permit/Deny PoliciesThe permit or deny policy for IP traffic you want to f

Page 256

10-43Access Control Lists (ACLs)Configuring and Assigning an ACL3. One or more deny/permit list entries (ACEs): One entry per line. 4. Implicit Deny:

Page 257

1-7Security OverviewSwitch Access SecurityOther Provisions for Management Access SecurityThe following features can help to prevent unauthorized manag

Page 258 - Public-Key Authentication

10-44Access Control Lists (ACLs)Configuring and Assigning an ACLFor example, figure 10-10 shows how to interpret the entries in a standard ACL.Figure

Page 259 - Bit Size Exponent <e>

10-45Access Control Lists (ACLs)Configuring and Assigning an ACLExtended ACL Configuration StructureIndividual ACEs in an extended ACL include: A per

Page 260

10-46Access Control Lists (ACLs)Configuring and Assigning an ACLFor example, figure 10-12 shows how to interpret the entries in an extended ACL.Figure

Page 261 - Note on Public

10-47Access Control Lists (ACLs)Configuring and Assigning an ACLsignificant because, once a match is found for a packet, subsequent ACEs in the same A

Page 262 - Key Index Number

10-48Access Control Lists (ACLs)Configuring and Assigning an ACLAllowing for the Implied Deny Function In any ACL having one or more ACEs there will a

Page 263

10-49Access Control Lists (ACLs)Configuring and Assigning an ACLUsing the CLI To Create an ACL You can use either the switch CLI or an offline text ed

Page 264

10-50Access Control Lists (ACLs)Configuring and Assigning an ACLTo insert an ACE anywhere in a numbered ACL, use the same process as described above f

Page 265

10-51Access Control Lists (ACLs)Configuring Standard ACLsConfiguring Standard ACLsTable 10-9. Command Summary for Standard ACLsAction Command(s) PageC

Page 266

10-52Access Control Lists (ACLs)Configuring Standard ACLsA standard ACL uses only source IP addresses in its ACEs. This type of ACE is useful when you

Page 267

10-53Access Control Lists (ACLs)Configuring Standard ACLsConfiguring Named, Standard ACLsThis section describes the commands for performing the follow

Page 268

1-8Security OverviewNetwork Security FeaturesNetwork Security FeaturesThis section outlines features for protecting access through the switch to the n

Page 269 - Prerequisite for Using SSL

10-54Access Control Lists (ACLs)Configuring Standard ACLsConfiguring ACEs in a Named, Standard ACL. Configuring ACEs is done after using the ip acces

Page 270

10-55Access Control Lists (ACLs)Configuring Standard ACLsExample of Creating and Listing a Standard, Named ACL. This exam-ple illustrates how to crea

Page 271

10-56Access Control Lists (ACLs)Configuring Standard ACLsFigure 10-15. Screen Output Listing the “Sample-List” ACL ContentCreating Numbered, Standard

Page 272 - Security Tab

10-57Access Control Lists (ACLs)Configuring Standard ACLsCreating or Adding to a Standard, Numbered ACL. This command is an alternative to using ip a

Page 273

10-58Access Control Lists (ACLs)Configuring Standard ACLs< any | host < SA > | SA < mask | SA/mask-length >>Defines the source IP a

Page 274

10-59Access Control Lists (ACLs)Configuring Standard ACLsExample of Creating and Viewing a Standard ACL. This example cre-ates a standard, numbered A

Page 275 - Generate New Certificate

10-60Access Control Lists (ACLs)Configuring Extended ACLsConfiguring Extended ACLsTable 10-10. Command Summary for Extended ACLsAction Command(s) Page

Page 276 - Show host certificate command

10-61Access Control Lists (ACLs)Configuring Extended ACLsStandard ACLs use only source IP addresses for filtering criteria, extended ACLs use multiple

Page 277

10-62Access Control Lists (ACLs)Configuring Extended ACLsConfiguring Named, Extended ACLsFor a match to occur with an ACE in an extended ACL, a packet

Page 278 - [SSL] button

10-63Access Control Lists (ACLs)Configuring Extended ACLsCreating a Named, Extended ACL and/or Entering the “Named ACL” (nacl) Context. This command

Page 279 - Web browser interface

1-9Security OverviewNetwork Security FeaturesFor more information, refer to Chapter 13 “Configuring Port-Based and User-Based Access Control (802.1X)”

Page 280

10-64Access Control Lists (ACLs)Configuring Extended ACLsConfigure ACEs in a Named, Extended ACL and/or Enter the “Named ACL” (nacl) Context. Configu

Page 281 - Browser Contact Behavior

10-65Access Control Lists (ACLs)Configuring Extended ACLs< ip | ip-protocol | ip-protocol-nbr >Used after deny or permit to specify the packet p

Page 282

10-66Access Control Lists (ACLs)Configuring Extended ACLs< any | host < DA > | DA/mask-length | DA/ < mask >>This is the second inst

Page 283

10-67Access Control Lists (ACLs)Configuring Extended ACLs[ tos < tos-setting > ]This option can be used after the DA to cause the ACE to match p

Page 284

10-68Access Control Lists (ACLs)Configuring Extended ACLsOptions for TCP and UDP Traffic in Extended ACLs. An ACE designed to permit or deny TCP or U

Page 285 - Common Errors in SSL setup

10-69Access Control Lists (ACLs)Configuring Extended ACLsPort Number or Well-Known Port Name: Use the TCP or UDP port number required by your appli-ca

Page 286

10-70Access Control Lists (ACLs)Configuring Extended ACLsOptions for ICMP Traffic in Extended ACLs. This option is useful where it is necessary to pe

Page 287 - Access Control Lists (ACLs)

10-71Access Control Lists (ACLs)Configuring Extended ACLs[ icmp-type-name ]These name options are an alternative to the [icmp-type [ icmp-code] ] meth

Page 288

10-72Access Control Lists (ACLs)Configuring Extended ACLsOption for IGMP in Extended ACLs. This option is useful where it is nec-essary to permit som

Page 289

10-73Access Control Lists (ACLs)Configuring Extended ACLsExample of a Named, Extended ACL. Suppose that you want to imple-ment these policies on a sw

Page 290

1-10Security OverviewNetwork Security FeaturesSecure Socket Layer (SSLv3/TLSv1)This feature includes use of Transport Layer Security (TLSv1) to provid

Page 291 - Dynamic Port ACLs

10-74Access Control Lists (ACLs)Configuring Extended ACLsFigure 10-19. Example of Configuration Commands for Extended ACLsConfiguring Numbered, Extend

Page 292

10-75Access Control Lists (ACLs)Configuring Extended ACLsCreating or Adding to an Extended, Numbered ACL. This command is an alternative to using ip

Page 293

10-76Access Control Lists (ACLs)Configuring Extended ACLs< deny | permit >Specifies whether to deny (drop) or permit (forward) a packet that mat

Page 294

10-77Access Control Lists (ACLs)Configuring Extended ACLs SA Mask Application: The mask is applied to the SA in the ACL to define which bits in a pack

Page 295

10-78Access Control Lists (ACLs)Configuring Extended ACLs[ precedence < 0 - 7 | precedence-name >]This option causes the ACE to match packets wi

Page 296

10-79Access Control Lists (ACLs)Configuring Extended ACLsAdditional Options for TCP and UDP Traffic. An ACE designed to per-mit or deny TCP or UDP tr

Page 297

10-80Access Control Lists (ACLs)Configuring Extended ACLsAdditional Option for IGMP. This option is useful where it is necessary to permit some types

Page 298

10-81Access Control Lists (ACLs)Adding or Removing an ACL Assignment On an InterfaceAdding or Removing an ACL Assignment On an InterfaceFiltering Rout

Page 299

10-82Access Control Lists (ACLs)Adding or Removing an ACL Assignment On an InterfaceFigure 10-20. Methods for Enabling and Disabling RACLsFiltering IP

Page 300

10-83Access Control Lists (ACLs)Adding or Removing an ACL Assignment On an InterfaceFigure 10-21. Methods for Enabling and Disabling VACLsProCurve(con

Page 301

1-11Security OverviewNetwork Security FeaturesPrecedence of Security Options. Where the switch is running multiple security options, it implements ne

Page 302 - RACL Applications

10-84Access Control Lists (ACLs)Adding or Removing an ACL Assignment On an InterfaceFiltering Inbound IP Traffic Per PortFor a given port, port list,

Page 303

10-85Access Control Lists (ACLs)Deleting an ACLDeleting an ACLSyntax: no ip access-list standard < name-str | 1-99 >no ip access-list extended &

Page 304 - VACL Applications

10-86Access Control Lists (ACLs)Editing an Existing ACLEditing an Existing ACLThe CLI provides the capability for editing in the switch by using seque

Page 305

10-87Access Control Lists (ACLs)Editing an Existing ACL Deleting the last ACE from an ACL leaves the ACL in memory. In this case, the ACL is “empty”

Page 306 - Multiple ACLs on an Interface

10-88Access Control Lists (ACLs)Editing an Existing ACLFor example, to append a fourth ACE to the end of the ACL in figure 10-23:Figure 10-25. Example

Page 307

10-89Access Control Lists (ACLs)Editing an Existing ACL2. Begin the ACE command with a sequence number that identifies the position you want the ACE

Page 308

10-90Access Control Lists (ACLs)Editing an Existing ACLDeleting an ACE from an Existing ACLThis action uses ACL sequence numbers to delete ACEs from a

Page 309

10-91Access Control Lists (ACLs)Editing an Existing ACLResequencing the ACEs in an ACLThis action reconfigures the starting sequence number for ACEs i

Page 310

10-92Access Control Lists (ACLs)Editing an Existing ACLAttaching a Remark to an ACEA remark is numbered in the same way as an ACE, and uses the same s

Page 311

10-93Access Control Lists (ACLs)Editing an Existing ACLNote After a numbered ACL has been created (using access-list < 1 - 99 | 100 - 199 >), it

Page 312 - ACL Operation

1-12Security OverviewAdvanced Threat DetectionAdvanced Threat DetectionAdvanced threat detection covers a range of features used to detect anoma-lous

Page 313

10-94Access Control Lists (ACLs)Editing an Existing ACLInserting Remarks and Related ACEs Within an Existing List. To insert an ACE with a remark wit

Page 314

10-95Access Control Lists (ACLs)Editing an Existing ACLOperating Notes for Remarks The resequence command ignores “orphan” remarks that do not have a

Page 315

10-96Access Control Lists (ACLs)Displaying ACL Configuration DataDisplaying ACL Configuration DataACL Commands Function Pageshow access-list Displays

Page 316 - Planning an ACL Application

10-97Access Control Lists (ACLs)Displaying ACL Configuration DataDisplay an ACL SummaryThis command lists the configured ACLs, regardless of whether t

Page 317

10-98Access Control Lists (ACLs)Displaying ACL Configuration DataDisplay the Content of All ACLs on the SwitchThis command lists the configuration det

Page 318 - Security

10-99Access Control Lists (ACLs)Displaying ACL Configuration DataDisplay the RACL and VACL Assignments for a VLANThis command briefly lists the identi

Page 319

10-100Access Control Lists (ACLs)Displaying ACL Configuration DataDisplay Static Port ACL Assignments This command briefly lists the identification an

Page 320

10-101Access Control Lists (ACLs)Displaying ACL Configuration DataDisplaying the Content of a Specific ACLThis command displays a specific ACL configu

Page 321

10-102Access Control Lists (ACLs)Displaying ACL Configuration DataFigure 10-37. Examples of Listings Showing the Content of Standard and Extended ACLs

Page 322

10-103Access Control Lists (ACLs)Displaying ACL Configuration DataTable 10-11. Descriptions of Data Types Included in Show Access-List < acl-id >

Page 323 - Access Control Entry (ACE)

1-13Security OverviewIdentity-Driven Manager (IDM)Identity-Driven Manager (IDM) IDM is a plug-in to ProCurve Manager Plus (PCM+) and uses RADIUS-ba

Page 324 - IP Address Mask

10-104Access Control Lists (ACLs)Creating or Editing ACLs OfflineCreating or Editing ACLs OfflineThe section titled “Editing an Existing ACL” on page

Page 325

10-105Access Control Lists (ACLs)Creating or Editing ACLs OfflineIf you are replacing an ACL on the switch with a new ACL that uses the same number or

Page 326

10-106Access Control Lists (ACLs)Creating or Editing ACLs Offline Deny all other IP traffic from VLAN 20 to VLAN 10. Deny all IP traffic from VLAN 3

Page 327

10-107Access Control Lists (ACLs)Creating or Editing ACLs OfflineIn this example, the CLI would show the following output to indicate that the ACL was

Page 328 - ACL Configuration Structure

10-108Access Control Lists (ACLs)Creating or Editing ACLs OfflineFigure 10-41. Example of Verifying the .txt File Download to the Switch5. If the conf

Page 329 - Standard ACL Structure

10-109Access Control Lists (ACLs)Enable ACL “Deny” LoggingEnable ACL “Deny” LoggingACL logging enables the switch to generate a message when IP traffi

Page 330

10-110Access Control Lists (ACLs)Enable ACL “Deny” LoggingACL Logging OperationWhen the switch detects a packet match with an ACE and the ACE includes

Page 331

10-111Access Control Lists (ACLs)Enable ACL “Deny” LoggingEnabling ACL Logging on the Switch1. If you are using a Syslog server, use the logging <

Page 332 - ACL Configuration Factors

10-112Access Control Lists (ACLs)Enable ACL “Deny” LoggingFigure 10-44. Commands for Applying an ACL with Logging to Figure 10-43ProCurve(config)# ip

Page 333

10-113Access Control Lists (ACLs)General ACL Operating NotesGeneral ACL Operating NotesACLs do not provide DNS hostname support. ACLs cannot be confi

Page 334

Hewlett-Packard Company8000 Foothills Boulevard, m/s 5551Roseville, California 95747-5551www.procurve.com© Copyright 2005-2007 Hewlett-Packard Develo

Page 335 - General ACE Rules

1-14Security OverviewIdentity-Driven Manager (IDM)— This page is intentionally unused —

Page 336

10-114Access Control Lists (ACLs)General ACL Operating NotesMonitoring Shared Resources. Applied ACLs share internal switch resources with several ot

Page 337 - Configuring Standard ACLs

11-111Configuring Advanced Threat ProtectionContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 338

11-2Configuring Advanced Threat ProtectionIntroductionIntroductionAs your network expands to include an increasing number of mobile devices, continuou

Page 339

11-3Configuring Advanced Threat ProtectionDHCP Snooping• Attempts to exhaust system resources so that sufficient resources are not available to transm

Page 340

11-4Configuring Advanced Threat ProtectionDHCP SnoopingDHCP snooping accomplishes this by allowing you to distinguish between trusted ports connected

Page 341

11-5Configuring Advanced Threat ProtectionDHCP SnoopingTo display the DHCP snooping configuration, enter this command:ProCurve(config)# show dhcp-snoo

Page 342

11-6Configuring Advanced Threat ProtectionDHCP SnoopingFigure 11-2. Example of Show DHCP Snooping StatisticsEnabling DHCP Snooping on VLANSDHCP snoopi

Page 343

11-7Configuring Advanced Threat ProtectionDHCP SnoopingConfiguring DHCP Snooping Trusted PortsBy default, all ports are untrusted. To configure a port

Page 344

11-8Configuring Advanced Threat ProtectionDHCP SnoopingConfiguring Authorized Server AddressesIf authorized server addresses are configured, a packet

Page 345 - 10-14 on page 10-55

11-9Configuring Advanced Threat ProtectionDHCP SnoopingNote DHCP snooping only overrides the Option 82 settings on a VLAN that has snooping enabled, n

Page 346 - Configuring Extended ACLs

2-12Configuring Username and Password SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 347

11-10Configuring Advanced Threat ProtectionDHCP SnoopingChanging the Remote-id from a MAC to an IP AddressBy default, DHCP snooping uses the MAC addre

Page 348

11-11Configuring Advanced Threat ProtectionDHCP SnoopingFigure 11-7. Example Showing the DHCP Snooping Verify MAC SettingThe DHCP Binding DatabaseDHCP

Page 349

11-12Configuring Advanced Threat ProtectionDHCP SnoopingA message is logged in the system event log if the DHCP binding database fails to update.To di

Page 350

11-13Configuring Advanced Threat ProtectionDHCP Snooping ProCurve recommends running a time synchronization protocol such as SNTP in order to track l

Page 351

11-14Configuring Advanced Threat ProtectionDHCP SnoopingCeasing untrusted relay information logs for <duration>. More than one DHCP client pack

Page 352

11-15Configuring Advanced Threat ProtectionDynamic ARP ProtectionDynamic ARP ProtectionIntroductionOn the VLAN interfaces of a routing switch, dynamic

Page 353

11-16Configuring Advanced Threat ProtectionDynamic ARP Protection• If a binding is valid, the switch updates its local ARP cache and forwards the pack

Page 354

11-17Configuring Advanced Threat ProtectionDynamic ARP ProtectionEnabling Dynamic ARP ProtectionTo enable dynamic ARP protection for VLAN traffic on a

Page 355 - [Shift] [?] key combination

11-18Configuring Advanced Threat ProtectionDynamic ARP ProtectionTake into account the following configuration guidelines when you use dynamic ARP pro

Page 356

11-19Configuring Advanced Threat ProtectionDynamic ARP ProtectionTo add the static configuration of an IP-to-MAC binding for a port to the database, e

Page 357

2-2Configuring Username and Password SecurityOverviewOverviewConsole access includes both the menu interface and the CLI. There are two levels of cons

Page 358

11-20Configuring Advanced Threat ProtectionDynamic ARP ProtectionYou can configure one or more of the validation checks. The following example of the

Page 359

11-21Configuring Advanced Threat ProtectionDynamic ARP ProtectionDisplaying ARP Packet StatisticsTo display statistics about forwarded ARP packets, dr

Page 360

11-22Configuring Advanced Threat ProtectionUsing the Instrumentation MonitorUsing the Instrumentation MonitorThe instrumentation monitor can be used t

Page 361

11-23Configuring Advanced Threat ProtectionUsing the Instrumentation MonitorOperating Notes To generate alerts for monitored events, you must enable

Page 362

11-24Configuring Advanced Threat ProtectionUsing the Instrumentation Monitor Alerts are automatically rate limited to prevent filling the log file wi

Page 363

11-25Configuring Advanced Threat ProtectionUsing the Instrumentation MonitorTo enable instrumentation monitor using the default parameters and thresh-

Page 364

11-26Configuring Advanced Threat ProtectionUsing the Instrumentation MonitorTo adjust the alert threshold for the MAC address count to a specific valu

Page 365

11-27Configuring Advanced Threat ProtectionUsing the Instrumentation MonitorAn alternate method of determining the current Instrumentation Monitor con

Page 366

11-28Configuring Advanced Threat ProtectionUsing the Instrumentation Monitor— This page is intentionally unused —

Page 367 - On an Interface

12-112Traffic/Security Filters and MonitorsContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 368

2-3Configuring Username and Password SecurityOverviewTo configure password security:1. Set a Manager password pair (and an Operator password pair, if

Page 369

12-2Traffic/Security Filters and MonitorsOverviewOverviewApplicable Switch Models. As of October, 2005, Traffic/Security filters are available on thes

Page 370

12-3Traffic/Security Filters and MonitorsFilter Types and OperationYou can enhance in-band security and improve control over access to network resourc

Page 371 - Deleting an ACL

12-4Traffic/Security Filters and MonitorsFilter Types and OperationSource-Port FiltersThis filter type enables the switch to forward or drop traffic f

Page 372 - Editing an Existing ACL

12-5Traffic/Security Filters and MonitorsFilter Types and Operation When you create a source port filter, all ports and port trunks (if any) on the s

Page 373 - Sequence Numbering in ACLs

12-6Traffic/Security Filters and MonitorsFilter Types and OperationFigure 12-3. The Filter for the Actions Shown in Figure 12-2Named Source-Port Filte

Page 374

12-7Traffic/Security Filters and MonitorsFilter Types and Operation A named source-port filter can only be deleted when it is not applied to any port

Page 375

12-8Traffic/Security Filters and MonitorsFilter Types and OperationA named source-port filter must first be defined and configured before it can be ap

Page 376

12-9Traffic/Security Filters and MonitorsFilter Types and OperationUsing Named Source-Port FiltersA company wants to manage traffic to the Internet an

Page 377

12-10Traffic/Security Filters and MonitorsFilter Types and Operation Applying Example Named Source-Port Filters. Once the named source-port filters ha

Page 378 - Attaching a Remark to an ACE

12-11Traffic/Security Filters and MonitorsFilter Types and OperationUsing the IDX value in the show filter command, we can see how traffic is filtered

Page 379

2-4Configuring Username and Password SecurityOverviewNote The manager and operator passwords and (optional) usernames control access to the menu inter

Page 380

12-12Traffic/Security Filters and MonitorsFilter Types and OperationThe same command, using IDX 26, shows how traffic from the Internet is handled.Pro

Page 381 - Operating Notes for Remarks

12-13Traffic/Security Filters and MonitorsFilter Types and OperationAs the company grows, more resources are required in accounting. Two additional ac

Page 382

12-14Traffic/Security Filters and MonitorsFilter Types and OperationThe following revisions to the named source-port filter definitions maintain the d

Page 383 - Display an ACL Summary

12-15Traffic/Security Filters and MonitorsFilter Types and OperationStatic Multicast FiltersThis filter type enables the switch to forward or drop mul

Page 384

12-16Traffic/Security Filters and MonitorsFilter Types and OperationNotes: Per-Port IP Multicast Filters. The static multicast filters described in th

Page 385

12-17Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersConfiguring Traffic/Security FiltersUse this procedure to specify the ty

Page 386

12-18Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersConfiguring a Source-Port Traffic FilterSyntax: [no] filter [source-port

Page 387 - Indicates whether the ACL

12-19Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersExample of Creating a Source-Port FilterFor example, assume that you wan

Page 388

12-20Traffic/Security Filters and MonitorsConfiguring Traffic/Security Filtersfilter on port 5, then create a trunk with ports 5 and 6, and display th

Page 389

12-21Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersFigure 12-7. Assigning Additional Destination Ports to an Existing Filte

Page 390 - The Offline Process

2-5Configuring Username and Password SecurityConfiguring Local Password SecurityConfiguring Local Password SecurityMenu: Setting PasswordsAs noted ear

Page 391 - ■ ID: “LIST-20-IN”

12-22Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersFor example, suppose you wanted to configure the filters in table 12-3 o

Page 392

12-23Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersDisplaying Traffic/Security FiltersThis command displays a listing of al

Page 393

12-24Traffic/Security Filters and MonitorsConfiguring Traffic/Security FiltersFigure 12-9. Example of Displaying Filter DataFilter Index Numbers (Auto

Page 394

13-113Configuring Port-Based andUser-Based Access Control (802.1X)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 395 - Enable ACL “Deny” Logging

13-2Configuring Port-Based and User-Based Access Control (802.1X)Contents3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . .

Page 396 - ACL Logging Operation

13-3Configuring Port-Based and User-Based Access Control (802.1X)OverviewOverviewWhy Use Port-Based or User-Based Access Control?Local Area Networks a

Page 397

13-4Configuring Port-Based and User-Based Access Control (802.1X)Overview• Port-Based access control option allowing authentication by a single client

Page 398

13-5Configuring Port-Based and User-Based Access Control (802.1X)Overviewthe session total includes any sessions begun by the Web Authentication or MA

Page 399 - General ACL Operating Notes

13-6Configuring Port-Based and User-Based Access Control (802.1X)TerminologyNote Port-Based 802.1X can operate concurrently with Web-Authentication or

Page 400

13-7Configuring Port-Based and User-Based Access Control (802.1X)Terminologylocal authentication is used, in which case the switch performs this funct

Page 401

2-6Configuring Username and Password SecurityConfiguring Local Password SecurityTo Delete Password Protection (Including Recovery from a Lost Password

Page 402

13-8Configuring Port-Based and User-Based Access Control (802.1X)TerminologySupplicant: The entity that must provide the proper credentials to the swi

Page 403 - DHCP Snooping

13-9Configuring Port-Based and User-Based Access Control (802.1X)General 802.1X Authenticator OperationGeneral 802.1X Authenticator OperationThis oper

Page 404 - Enabling DHCP Snooping

13-10Configuring Port-Based and User-Based Access Control (802.1X)General 802.1X Authenticator OperationNote The switches covered in this guide can us

Page 405

13-11Configuring Port-Based and User-Based Access Control (802.1X)General 802.1X Authenticator OperationFigure 13-1. Priority of VLAN Assignment for a

Page 406

13-12Configuring Port-Based and User-Based Access Control (802.1X)General Operating Rules and NotesGeneral Operating Rules and Notes In the user-base

Page 407

13-13Configuring Port-Based and User-Based Access Control (802.1X)General Operating Rules and Notes If a port on switch “A” is configured as an 802.1

Page 408

13-14Configuring Port-Based and User-Based Access Control (802.1X)General Setup Procedure for 802.1X Access ControlGeneral Setup Procedure for 802.1X

Page 409

13-15Configuring Port-Based and User-Based Access Control (802.1X)General Setup Procedure for 802.1X Access ControlOverview: Configuring 802.1X Authen

Page 410

13-16Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsNote If you want to implement the o

Page 411 - The DHCP Binding Database

13-17Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators1. Enable 802.1X Authentication on

Page 412 - Operational Notes

2-7Configuring Username and Password SecurityConfiguring Local Password SecurityCLI: Setting Passwords and UsernamesCommands Used in This SectionConfi

Page 413 - Log Messages

13-18Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsB. Specify User-Based Authenticatio

Page 414

13-19Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsExample: Configuring User-Based 802

Page 415 - Dynamic ARP Protection

13-20Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators[quiet-period < 0 - 65535 >]S

Page 416

13-21Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators3. Configure the 802.1X Authenticat

Page 417 - Configuring Trusted Ports

13-22Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsFor example, to enable the switch t

Page 418

13-23Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators5. Enable 802.1X Authentication on

Page 419

13-24Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators7. Optional: Configure 802.1X Contr

Page 420

13-25Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsThe aaa port-access controlled-dire

Page 421

13-26Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeFigure 13-5. Example of Configuring 802.1X Controlled Direction

Page 422

13-27Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeThe 802.1X Open VLAN mode solves this problem by temporarily su

Page 423

2-8Configuring Username and Password SecurityFront-Panel SecurityWeb: Setting Passwords and UsernamesIn the web browser interface you can enter passwo

Page 424

13-28Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeA port assigned to a VLAN by an Authorized-Client VLAN configur

Page 425 - Examples

13-29Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeTable 13-2. 802.1X Open VLAN Mode Options802.1X Per-Port Config

Page 426

13-30Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeAuthorized-Client VLAN • After client authentication, the port

Page 427

13-31Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeOpen VLAN Mode with Only an Unauthorized-Client VLAN Configured

Page 428

13-32Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeOpen VLAN Mode with Only an Authorized-Client VLAN Configured:•

Page 429

13-33Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeOperating Rules for Authorized-Client andUnauthorized-Client VL

Page 430

13-34Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeEffect of Unauthorized-Client VLAN session on untagged port VLA

Page 431 - Filter Types and Operation

13-35Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeEffect of RADIUS-assigned VLANThis rule assumes no other authen

Page 432 - Source-Port Filters

13-36Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeNote: If you use the same VLAN as the Unauthorized-Client VLAN

Page 433

13-37Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeSetting Up and Configuring 802.1X Open VLAN ModePreparation. Th

Page 434 - Named Source-Port Filters

2-9Configuring Username and Password SecurityFront-Panel Security Gaining management access to the switch by having physical access to the switch its

Page 435

13-38Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeNote that as an alternative, you can configure the switch to us

Page 436 - [ index ]

13-39Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN Mode3. If you selected either eap-radius or chap-radius for step 2,

Page 437

13-40Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeConfiguring 802.1X Open VLAN Mode. Use these commands to actual

Page 438

13-41Configuring Port-Based and User-Based Access Control (802.1X)802.1X Open VLAN ModeInspecting 802.1X Open VLAN Mode Operation. For information an

Page 439

13-42Configuring Port-Based and User-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X-Authent

Page 440

13-43Configuring Port-Based and User-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X-Authent

Page 441

13-44Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other S

Page 442

13-45Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other S

Page 443 - Static Multicast Filters

13-46Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other S

Page 444 - Protocol Filters

13-47Configuring Port-Based and User-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other S

Page 445

iiiContentsProduct DocumentationAbout Your Switch Manual Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xixPrinted Publication

Page 446

2-10Configuring Username and Password SecurityFront-Panel SecurityFront-Panel Button Functions The front panel of the switch includes the Reset button

Page 447 - * ), indicating that the

13-48Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersDisplaying 802.1X Configura

Page 448 - Editing a Source-Port Filter

13-49Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Countersshow port-access authentica

Page 449

13-50Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 13-8. Example of sho

Page 450 - Filter Indexing

13-51Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersViewing 802.1X Open VLAN Mo

Page 451

13-52Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersThus, in the output shown i

Page 452

13-53Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersTable 13-3. Output for Dete

Page 453 - Configuring Port-Based and

13-54Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 13-10.Example of Sho

Page 454

13-55Configuring Port-Based and User-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersShow Commands for Port-Acce

Page 455

13-56Configuring Port-Based and User-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN Operationsupplicant port to another wi

Page 456 - User Authentication Methods

13-57Configuring Port-Based and User-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFor example, suppose that a R

Page 457

2-11Configuring Username and Password SecurityFront-Panel SecurityReset ButtonPressing the Reset button alone for one second causes the switch to rebo

Page 458

13-58Configuring Port-Based and User-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFigure 13-12.The Active Confi

Page 459 - 802.1X standard

13-59Configuring Port-Based and User-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationWhen the 802.1X client’s sess

Page 460

13-60Configuring Port-Based and User-Based Access Control (802.1X)Operating NotesOperating Notes Applying Web Authentication or MAC Authentication Co

Page 461

13-61Configuring Port-Based and User-Based Access Control (802.1X)Messages Related to 802.1X OperationMessages Related to 802.1X OperationTable 13-4.

Page 462 - VLAN Membership Priority

13-62Configuring Port-Based and User-Based Access Control (802.1X)Messages Related to 802.1X Operation— This page is intentionally unused —

Page 463

14-114Configuring and Monitoring Port SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 464

14-2Configuring and Monitoring Port Security ContentsWeb: Checking for Intrusions, Listing IntrusionAlerts, and Resetting Alert Flags . . . . . .

Page 465

14-3Configuring and Monitoring Port SecurityOverviewOverviewPort Security (Page 14-4). This feature enables you to configure each switch port with a

Page 466 - Access Control

14-4Configuring and Monitoring Port Security Port SecurityPort SecurityBasic OperationDefault Port Security Operation. The default port security s

Page 467

14-5Configuring and Monitoring Port SecurityPort Security• Static: Enables you to set a fixed limit on the number of MAC addresses authorized for the

Page 468 - Authenticators

2-12Configuring Username and Password SecurityFront-Panel Security3. Release the Reset button.4. When the Test LED to the right of the Clear button be

Page 469

14-6Configuring and Monitoring Port Security Port Securityconfiguration to ports on which hubs, switches, or other devices are connected, and to m

Page 470 - Based Authentication

14-7Configuring and Monitoring Port SecurityPort SecurityPlanning Port Security1. Plan your port security configuration and monitoring according to th

Page 471

14-8Configuring and Monitoring Port Security Port SecurityPort Security Command Options and OperationPort Security Commands Used in This SectionTh

Page 472

14-9Configuring and Monitoring Port SecurityPort SecurityDisplaying Port Security Settings. Figure 14-2. Example Port Security Listing (Ports A7 and

Page 473

14-10Configuring and Monitoring Port Security Port SecurityFigure 14-3. Example of the Port Security Configuration Display for a Single PortThe n

Page 474

14-11Configuring and Monitoring Port SecurityPort SecurityListing Authorized and Detected MAC Addresses. Figure 14-4. Examples of Show Mac-Address Ou

Page 475

14-12Configuring and Monitoring Port Security Port SecurityConfiguring Port SecurityUsing the CLI, you can: Configure port security and edit secu

Page 476 - Wake-on-LAN Traffic

14-13Configuring and Monitoring Port SecurityPort SecuritySyntax: port-security (Continued)learn-mode < continuous | static | port-access | config

Page 477

14-14Configuring and Monitoring Port Security Port SecuritySyntax: port-security (Continued)learn-mode < continuous | static | port-access | c

Page 478 - 802.1X Open VLAN Mode

14-15Configuring and Monitoring Port SecurityPort SecuritySyntax: port-security (Continued)Addresses learned this way appear in the switch and port ad

Page 479 - VLAN Membership Priorities

2-13Configuring Username and Password SecurityFront-Panel Security• Configure the Clear button to reboot the switch after clearing any local usernames

Page 480

14-16Configuring and Monitoring Port Security Port SecuritySyntax: port-security (Continued)mac-address [<mac-addr>] [<mac-addr>] . .

Page 481

14-17Configuring and Monitoring Port SecurityPort SecuritySyntax: port-security (Continued)clear-intrusion-flagClears the intrusion flag for a specifi

Page 482

14-18Configuring and Monitoring Port Security Port SecurityRetention of Static AddressesStatic MAC addresses do not age-out. MAC addresses learned

Page 483

14-19Configuring and Monitoring Port SecurityPort SecuritySpecifying Authorized Devices and Intrusion Responses. This example configures port A1 to au

Page 484

14-20Configuring and Monitoring Port Security Port SecurityAdding an Authorized Device to a Port. To simply add a device (MAC address) to a port’s

Page 485 - Unauthorized-Client VLANs

14-21Configuring and Monitoring Port SecurityPort Security(The message Inconsistent value appears if the new MAC address exceeds the current Address L

Page 486

14-22Configuring and Monitoring Port Security Port SecurityRemoving a Device From the “Authorized” List for a Port. This command option removes un

Page 487

14-23Configuring and Monitoring Port SecurityMAC LockdownThe following command serves this purpose by removing 0c0090-123456 and reducing the Address

Page 488

14-24Configuring and Monitoring Port Security MAC LockdownYou will need to enter a separate command for each MAC/VLAN pair you wish to lock down.

Page 489

14-25Configuring and Monitoring Port SecurityMAC LockdownOther Useful Information. Once you lock down a MAC address/VLAN pair on one port that pair ca

Page 490

2-14Configuring Username and Password SecurityFront-Panel SecurityFor example, show front-panel-security produces the following output when the switch

Page 491

14-26Configuring and Monitoring Port Security MAC LockdownMAC Lockdown Operating Notes Limits. There is a limit of 500 MAC Lockdowns that you can

Page 492

14-27Configuring and Monitoring Port SecurityMAC LockdownDeploying MAC LockdownWhen you deploy MAC Lockdown you need to consider how you use it within

Page 493

14-28Configuring and Monitoring Port Security MAC LockdownFigure 14-10.MAC Lockdown Deployed At the Network Edge Provides SecurityBasic MAC Lockdo

Page 494 - Configure Port-Security

14-29Configuring and Monitoring Port SecurityMAC LockdownThe key points for this Model Topology are:• The Core Network is separated from the edge by t

Page 495 - Port-Security

14-30Configuring and Monitoring Port Security MAC LockdownFigure 14-11.Connectivity Problems Using MAC Lockdown with Multiple Paths The resultant

Page 496 - Other Switches

14-31Configuring and Monitoring Port SecurityMAC LockoutMAC LockoutMAC Lockout involves configuring a MAC address on all ports and VLANs for a switch

Page 497

14-32Configuring and Monitoring Port Security MAC LockoutMAC Lockout overrides MAC Lockdown, port security, and 802.1X authenti-cation.You cannot

Page 498 - Supplicant Port Configuration

14-33Configuring and Monitoring Port SecurityMAC LockoutPort Security and MAC LockoutMAC Lockout is independent of port-security and in fact will over

Page 499

14-34Configuring and Monitoring Port Security Web: Displaying and Configuring Port Security FeaturesWeb: Displaying and Configuring Port Security

Page 500 - Statistics, and Counters

14-35Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert Flags The switch enables notification of the intrusion thro

Page 501 - ■ Auth-VLAN ID (if any)

2-15Configuring Username and Password SecurityFront-Panel SecurityFigure 2-8. Example of Disabling the Clear Button and Displaying the New Configurati

Page 502

14-36Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert FlagsThe log shows the most recent intrusion at the top

Page 503

14-37Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsMenu: Checking for Intrusions, Listing Intrusion Alerts

Page 504

14-38Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert Flags• Because the Port Status screen (figure 14-14 on

Page 505

14-39Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsIn the following example, executing show interfaces bri

Page 506

14-40Configuring and Monitoring Port Security Reading Intrusion Alerts and Resetting Alert FlagsTo clear the intrusion from port A1 and enable the

Page 507 - ■ The switch reboots

14-41Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsFigure 14-19.Example of Log Listing With and Without De

Page 508 - Affects VLAN Operation

14-42Configuring and Monitoring Port Security Operating Notes for Port SecurityOperating Notes for Port SecurityIdentifying the IP Address of an I

Page 509

14-43Configuring and Monitoring Port SecurityOperating Notes for Port SecurityProCurve(config)# port-security e a17 learn-mode static address-limit 2L

Page 510

14-44Configuring and Monitoring Port Security Operating Notes for Port Security— This page is intentionally unused —

Page 511 - After the 802.1X session

15-115Using Authorized IP Managers ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 512

2-16Configuring Username and Password SecurityFront-Panel SecurityRe-Enabling the Clear Button on the Switch’s Front Paneland Setting or Changing the

Page 513 - < port-number >:

15-2Using Authorized IP ManagersOverviewOverviewAuthorized IP Manager Features The Authorized IP Managers feature uses IP addresses and masks to deter

Page 514

15-3Using Authorized IP ManagersOptionsOptionsYou can configure: Up to 10 authorized manager addresses, where each address applies to either a single

Page 515

15-4Using Authorized IP ManagersDefining Authorized Management StationsDefining Authorized Management Stations Authorizing Single Stations: The table

Page 516

15-5Using Authorized IP ManagersDefining Authorized Management Stationsrized Manager IP address to authorize four IP addresses for management station

Page 517

15-6Using Authorized IP ManagersDefining Authorized Management StationsFigure 15-2. Example of How To Add an Authorized Manager Entry (Continued)Editi

Page 518 - Port Security

15-7Using Authorized IP ManagersDefining Authorized Management StationsFigure 15-3.Example of the Show IP Authorized-Manager DisplayThe above example

Page 519 - Blocking Unauthorized Traffic

15-8Using Authorized IP ManagersDefining Authorized Management StationsIf you omit the < mask bits > when adding a new authorized manager, the s

Page 520 - Trunk Group Exclusion

15-9Using Authorized IP ManagersWeb: Configuring IP Authorized ManagersWeb: Configuring IP Authorized ManagersIn the web browser interface you can con

Page 521 - Planning Port Security

15-10Using Authorized IP ManagersBuilding IP MasksConfiguring Multiple Stations Per Authorized Manager IP EntryThe mask determines whether the IP addr

Page 522 - Port Security Display Options

15-11Using Authorized IP ManagersBuilding IP MasksFigure 15-6. Analysis of IP Mask for Multiple-Station Entries Figure 15-7. Example of How the Bitmap

Page 523

2-17Configuring Username and Password SecurityFront-Panel SecurityFigure 2-9. Example of Re-Enabling the Clear Button’s Default OperationChanging the

Page 524

15-12Using Authorized IP ManagersOperating NotesAdditional Examples for Authorizing Multiple StationsOperating Notes Network Security Precautions: Yo

Page 525

15-13Using Authorized IP ManagersOperating Notes• Even if you need proxy server access enabled in order to use other applications, you can still elimi

Page 526 - Configuring Port Security

15-14Using Authorized IP ManagersOperating Notes— This page is intentionally unused —

Page 527

16-116Key Management SystemContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 528

16-2Key Management SystemOverviewOverviewThe switches covered in this guide provide support for advanced routing capabilities. Security turns out to b

Page 529 - use this command syntax:

16-3Key Management SystemConfiguring Key Chain ManagementConfiguring Key Chain ManagementThe Key Management System (KMS) has three configuration steps

Page 530

16-4Key Management SystemConfiguring Key Chain ManagementFigure 16-1. Adding a New Key Chain EntryAfter you add an entry, you can assign key(s) to it

Page 531

16-5Key Management SystemConfiguring Key Chain Management Figure 16-2. Example of Adding and Displaying a Time-Independent Key to a Key Chain Entry As

Page 532 - Retention of Static Addresses

16-6Key Management SystemConfiguring Key Chain ManagementNote Using time-dependent keys requires that all the switches have accurate, synchronized tim

Page 533

16-7Key Management SystemConfiguring Key Chain ManagementNote Given transmission delays and the variations in the time value from switch to switch, it

Page 534

2-18Configuring Username and Password SecurityFront-Panel SecurityFigure 2-10. Example of Disabling the Factory Reset OptionPassword RecoveryThe passw

Page 535

16-8Key Management SystemConfiguring Key Chain ManagementThe “Procurve1” key chain entry is a time-independent key and will not expire. “Procurve2” us

Page 536

Index – 1IndexNumerics3DES … 8-3, 9-3802.1XACL, effect on … 10-20802.1X access controlauthenticate users … 13-5authentication methods … 13-4authentica

Page 537 - MAC Lockdown

2 – Indexport-basedaccess … 13-4client without authentication … 13-5effect of Web/MAC Auth client … 13-60enable … 13-17, 13-43latest client, effect …

Page 538

Index – 3untagged … 13-27, 13-30, 13-31untagged membership … 13-18VLAN operation … 13-56VLAN use, multiple clients … 13-6VLAN, assignment conflict … 1

Page 539

4 – Indexexample, named extended … 10-73exception for connection-rate filtering … 10-22exit statement … 10-48extendedcommand summary … 10-8configure …

Page 540 - MAC Lockdown Operating Notes

Index – 5policies … 10-30policy application points … 1-8, 10-4policy type … 10-42policy, permit/deny … 10-42port … 10-34port ACL definedSee also stat

Page 541 - Deploying MAC Lockdown

6 – IndexACL, connection-rateSee connection-rate filteringACLsmanagement access protection … 1-8See also RADIUS-assigned ACLs.addressauthorized for po

Page 542

Index – 7false positive … 3-6guidelines … 3-8, 3-9high rate, legitimate … 3-18host, trusted … 3-18host, unblocking … 3-18ICMP ping message … 3-3notify

Page 543

8 – Indexevent logalerts for monitored events … 11-23connection-rate filtering alerts … 3-31intrusion alerts … 14-40messages … 3-31Ffilter, source-por

Page 544

Index – 9LLACP802.1X not allowed … 13-13, 13-17, 13-61log keyword, ACL mirroring … 10-16login attempts, monitoring … 11-23MMAC addressesmonitoring act

Page 545 - MAC Lockout

2-19Configuring Username and Password SecurityFront-Panel SecuritySteps for Disabling Password-Recovery. 1. Set the CLI to the global interface conte

Page 546 - 1025-2048 8 8

10 – Index See ProCurve Manager.physical security … 1-6portsecurity configuration … 14-3trusted … 11-17untrusted … 11-18port accessclient limit … 13-1

Page 547 - Port Security and MAC Lockout

Index – 11multiple ACL application types in use … 7-15NAS-Prompt-User service-type value … 6-12network accounting … 6-32operating rules, switch … 6-6o

Page 548 - Alert Flags

12 – Indexnotices of … 14-34security, ACLSee ACL, security use.security, passwordSee SSH.setting a password … 2-5SFTP … 1-6SNMPauthentication failures

Page 549

Index – 13generate host key pair … 9-10generate self-signed … 9-13generate self-signed certificate … 9-10, 9-13generate server host certificate … 9-10

Page 550 - Send-Disable

14 – IndexTLSSee RADIUS.troubleshootingauthentication via Telnet … 5-15authorized IP managers … 15-12trunkfilter, source-port … 12-3, 12-19LACP, 802.1

Page 552 - Yes” for the port on which

Technical information in this documentis subject to change without notice.© Copyright 2005-2007Hewlett-Packard Development Company, L.P.Reproduction,

Page 553

ivTraffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10Port Security, MAC Lockdown, and MAC Lock

Page 554

2-20Configuring Username and Password SecurityFront-Panel SecurityFigure 2-11. Example of the Steps for Disabling Password-RecoveryPassword Recovery P

Page 555

3-13Virus Throttling ContentsOverview of Connection-Rate Filtering . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Features and Benefits . . .

Page 556

3-2Virus ThrottlingContentsExample of Using an ACL in a Connection-Rate Configuration . . . . 3-27Connection-Rate ACL Operating Notes . . . . . . .

Page 557

3-3Virus ThrottlingOverview of Connection-Rate FilteringOverview of Connection-Rate FilteringThe spread of malicious agents in the form of worms exhib

Page 558

3-4Virus ThrottlingOverview of Connection-Rate FilteringFeatures and BenefitsConnection-rate filtering is a countermeasure tool you can use in your in

Page 559 - Using Authorized IP Managers

3-5Virus ThrottlingOverview of Connection-Rate FilteringGeneral OperationConnection-rate filtering enables notification of worm-like behavior detected

Page 560

3-6Virus ThrottlingOverview of Connection-Rate FilteringApplication OptionsFor the most part, normal network traffic is distinct from the traffic exhi

Page 561 - Access Levels

3-7Virus ThrottlingOverview of Connection-Rate FilteringOperating Rules Connection-rate filtering is triggered by inbound IP traffic exhibiting high

Page 562 - Stations

3-8Virus ThrottlingGeneral Configuration GuidelinesGeneral Configuration GuidelinesAs stated earlier, connection-rate filtering is triggered only by i

Page 563 - Managers

3-9Virus ThrottlingGeneral Configuration GuidelinesNote On a given VLAN, to unblock the hosts that have been blocked by the connection-rate feature, u

Page 564

v3 Virus ThrottlingContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1Overview of

Page 565

3-10Virus ThrottlingConfiguring Connection-Rate FilteringConfiguring Connection-Rate FilteringNote As stated previously, connection-rate filtering is

Page 566

3-11Virus ThrottlingConfiguring Connection-Rate FilteringEnabling Connection-Rate Filtering and Configuring SensitivityNote The sensitivity settings c

Page 567 - Building IP Masks

3-12Virus ThrottlingConfiguring Connection-Rate FilteringConfiguring the Per-Port Filtering ModeTable 3-1. Throttle Mode Penalty PeriodsSyntax: filter

Page 568 - IP Entry

3-13Virus ThrottlingConfiguring Connection-Rate FilteringExample of a Basic Connection-Rate Filtering ConfigurationFigure 3-2. Sample NetworkBasic Con

Page 569

3-14Virus ThrottlingConfiguring Connection-Rate FilteringFigure 3-3. Example of a Basic Connection-Rate ConfigurationEnables connection-rate filtering

Page 570

3-15Virus ThrottlingConfiguring Connection-Rate FilteringViewing and Managing Connection-Rate StatusThe commands in this section describe how to: Vie

Page 571

3-16Virus ThrottlingConfiguring Connection-Rate FilteringTo view the complete connection-rate configuration, including any ACLs (page 3-19), use show

Page 572

3-17Virus ThrottlingConfiguring Connection-Rate FilteringListing Currently-Blocked HostsFigure 3-6. Example of Listing Hosts in Any Connection-Rate St

Page 573 - Key Management System

3-18Virus ThrottlingConfiguring Connection-Rate FilteringUnblocking Currently-Blocked HostsIf a host becomes blocked by triggering connection-rate fil

Page 574

3-19Virus ThrottlingConfiguring and Applying Connection-Rate ACLsConfiguring and Applying Connection-Rate ACLsA host sending legitimate, routed traffi

Page 575

vi4 Web and MAC AuthenticationContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1

Page 576

3-20Virus ThrottlingConfiguring and Applying Connection-Rate ACLsFor more information on when to apply connection-rate ACLs, refer to “Appli-cation Op

Page 577

3-21Virus ThrottlingConfiguring and Applying Connection-Rate ACLsFigure 3-8. Connection-Rate ACL Applied to Traffic Received Through a Given PortConfi

Page 578

3-22Virus ThrottlingConfiguring and Applying Connection-Rate ACLs< filter | ignore >The filter option assigns policy filtering to traffic with s

Page 579

3-23Virus ThrottlingConfiguring and Applying Connection-Rate ACLsConfiguring a Connection-Rate ACL Using UDP/TCP Criteria(To configure a connection-ra

Page 580

3-24Virus ThrottlingConfiguring and Applying Connection-Rate ACLsip-addr < mask-length >: Applies the ACEs action (filter or ignore) to IP traff

Page 581 - Numerics

3-25Virus ThrottlingConfiguring and Applying Connection-Rate ACLsFigure 3-9. Examples of Connection-Rate ACEs Using UDP/TCP Criteria< tcp-data >

Page 582 - See also port based

3-26Virus ThrottlingConfiguring and Applying Connection-Rate ACLsApplying Connection-Rate ACLsTo apply a connection-rate ACL, use the access group com

Page 583 - See sequence, ACEs

3-27Virus ThrottlingConfiguring and Applying Connection-Rate ACLsFor more on ACE masks, refer to “How an ACE Uses a Mask To Screen Packets for Matches

Page 584 - 4 – Index

3-28Virus ThrottlingConfiguring and Applying Connection-Rate ACLsconfigure a connection-rate ACL that causes the switch to ignore (circumvent) connect

Page 585 - Index – 5

3-29Virus ThrottlingConfiguring and Applying Connection-Rate ACLsFigure 3-12. Example of Switch Configuration Display with a Connection-Rate ACLConnec

Page 586 - 6 – Index

viiOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2Terminology Used in TACACS

Page 587 - Index – 7

3-30Virus ThrottlingConfiguring and Applying Connection-Rate ACLs• filter < source-criteria >: This ACE type does the opposite of an ignore entr

Page 588 - 8 – Index

3-31Virus ThrottlingConnection-Rate Log and Trap MessagesConnection-Rate Log and Trap MessagesThese messages appear in the switch’s Event Log identify

Page 589 - Index – 9

3-32Virus ThrottlingConnection-Rate Log and Trap Messages— This page is intentionally unused —

Page 590 - 10 – Index

4-14Web and MAC AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 591 - Index – 11

4-2Web and MAC AuthenticationOverviewOverviewWeb and MAC Authentication are designed for employment on the “edge” of a network to provide port-based s

Page 592 - 12 – Index

4-3Web and MAC AuthenticationOverviewpassword, and grants or denies network access in the same way that it does for clients capable of interactive log

Page 593 - Index – 13

4-4Web and MAC AuthenticationOverview On a port configured for Web or MAC Authentication, the switch operates as a port-access authenticator using a

Page 594 - 14 – Index

4-5Web and MAC AuthenticationHow Web and MAC Authentication OperateHow Web and MAC Authentication OperateAuthenticator OperationBefore gaining access

Page 595

4-6Web and MAC AuthenticationHow Web and MAC Authentication OperateFigure 4-2. Progress Message During AuthenticationIf the client is authenticated an

Page 596 - 5991-3828

4-7Web and MAC AuthenticationHow Web and MAC Authentication Operatemoves have not been enabled (client-moves) on the ports, the session ends and the c

Comments to this Manuals

No comments