EasyManuals Logo

HP 5920 Series Configuration Guide

HP 5920 Series
424 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #8 background imageLoading...
Page #8 background image
vi
Configuring a manual IPsec profile ··················································································································· 238
Configuring SNMP notifications for IPsec ················································································································· 240
Displaying and maintaining IPsec ······························································································································ 240
IPsec configuration examples······································································································································ 241
Configuring a manual mode IPsec tunnel for IPv4 packets ············································································ 241
Configuring an IKE-based IPsec tunnel for IPv4 packets ················································································· 243
Configuring IPsec for RIPng ································································································································ 246
Configuring IKE ······················································································································································· 250
Overview ······································································································································································· 250
IKE negotiation process ······································································································································ 250
IKE security mechanism ······································································································································· 251
Protocols and standards ····································································································································· 252
FIPS compliance ··························································································································································· 252
IKE configuration prerequisites ··································································································································· 252
IKE configuration task list ············································································································································ 252
Configuring an IKE profile ·········································································································································· 253
Configuring an IKE proposal ······································································································································ 255
Configuring an IKE keychain ······································································································································ 256
Configuring the global identity information ·············································································································· 257
Configuring the IKE keepalive function ······················································································································ 258
Configuring the IKE NAT keepalive function ············································································································ 259
Configuring IKE DPD···················································································································································· 259
Enabling invalid SPI recovery ····································································································································· 260
Setting the maximum number of IKE SAs ··················································································································· 260
Configuring SNMP notifications for IKE ···················································································································· 261
Displaying and maintaining IKE ································································································································· 261
IKE configuration examples ········································································································································ 262
Main mode IKE with pre-shared key authentication configuration example ················································ 262
Verifying the configuration ································································································································· 264
Troubleshooting IKE ····················································································································································· 264
IKE negotiation failed because no matching IKE proposals were found ······················································· 264
IKE negotiation failed because no IKE proposals or IKE keychains are referenced correctly····················· 265
IPsec SA negotiation failed because no matching IPsec transform sets were found ···································· 266
IPsec SA negotiation failed due to invalid identity information ······································································ 266
Configuring SSH ····················································································································································· 269
Overview ······································································································································································· 269
How SSH works ··················································································································································· 269
SSH authentication methods ······························································································································· 270
FIPS compliance ··························································································································································· 271
Configuring the device as an SSH server ·················································································································· 272
SSH server configuration task list ······················································································································ 272
Generating local key pairs ································································································································· 272
Enabling the SSH server function ······················································································································· 273
Enabling the SFTP server function ······················································································································ 274
Configuring NETCONF over SSH ····················································································································· 274
Configuring the user lines for SSH login ··········································································································· 274
Configuring a client's host public key ··············································································································· 275
Configuring an SSH user ···································································································································· 276
Setting the SSH management parameters ········································································································ 277
Configuring the device as an Stelnet client ··············································································································· 278
Stelnet client configuration task list ···················································································································· 278
Specifying the source IP address for SSH packets ··························································································· 279
Establishing a connection to an Stelnet server ································································································· 279

Table of Contents

Other manuals for HP 5920 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP 5920 Series and is the answer not in the manual?

HP 5920 Series Specifications

General IconGeneral
BrandHP
Model5920 Series
CategorySwitch
LanguageEnglish

Related product manuals