EasyManua.ls Logo

HP E3800 Series

HP E3800 Series
732 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xx
CLI: Checking for Intrusions, Listing Intrusion Alerts,
and Resetting Alert Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-36
Using the Event Log To Find Intrusion Alerts . . . . . . . . . . . . . . . . . . 14-38
Operating Notes for Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-39
15 Using Authorized IP Managers
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3
Defining Authorized Management Stations . . . . . . . . . . . . . . . . . . . . 15-4
Overview of IP Mask Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4
Menu: Viewing and Configuring IP Authorized Managers . . . . . . . . . 15-5
CLI: Viewing and Configuring Authorized IP Managers . . . . . . . . . . . 15-6
Listing the Switch’s Current Authorized IP Manager(s) . . . . . . . 15-6
Configuring IP Authorized Managers for the Switch . . . . . . . . . . 15-7
WebAgent: Configuring IP Authorized Managers . . . . . . . . . . . . . . . 15-9
Web Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-10
How to Eliminate the Web Proxy Server . . . . . . . . . . . . . . . . . . 15-10
Using a Web Proxy Server to Access the WebAgent . . . . . . . . . 15-10
Building IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-11
Configuring One Station Per Authorized Manager IP Entry . . . . . . 15-11
Configuring Multiple Stations Per Authorized Manager IP Entry . . 15-11
Additional Examples for Authorizing Multiple Stations . . . . . . . . . 15-13
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-14
16 Key Management System
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1
Configuring Key Chain Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2
Creating and Deleting Key Chain Entries . . . . . . . . . . . . . . . . . . . . . . . 16-2
Assigning a Time-Independent Key to a Chain . . . . . . . . . . . . . . . . . . 16-3
Assigning Time-Dependent Keys to a Chain . . . . . . . . . . . . . . . . . . . . 16-5

Table of Contents

Related product manuals