EasyManua.ls Logo

HP ProCurve 2510G Series User Manual

HP ProCurve 2510G Series
320 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #166 background imageLoading...
Page #166 background image
6-20
Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
Caution To allow SSH access only to clients having the correct public key, you must
configure the secondary (password) method for login public-key to none.
Otherwise a client without the correct public key can still gain entry by
submitting a correct local login password.
For example, assume that you have a client public-key file named Client-
Keys.pub (on a TFTP server at 10.33.18.117) ready for downloading to the
switch. For SSH access to the switch you want to allow only clients having a
private key that matches a public key found in Client-Keys.pub. For Manager-
level (enable) access for successful SSH clients you want to use TACACS+ for
primary password authentication and local for secondary password authenti-
cation, with a Manager username of "1eader" and a password of "m0ns00n".
To set up this operation you would configure the switch in a manner similar
to the following:
Syntax: copy tftp pub-key-file < ip-address > < filename >
Copies a public key file into the switch.
aaa authentication ssh login public-key
Configures the switch to authenticate a client public-key at
the login level with an optional secondary password method
(Default: none).
Note: The secondary access cannot be local.
Syntax: aaa authentication ssh enable < local | tacacs | radius > < local | none >
Configures a password method for the primary and second-
ary enable (Manager) access. If you do not specify an
optional secondary method, it defaults to none.
Note: If the primary access is local, the secondary access
cannot be local.

Table of Contents

Other manuals for HP ProCurve 2510G Series

Question and Answer IconNeed help?

Do you have a question about the HP ProCurve 2510G Series and is the answer not in the manual?

HP ProCurve 2510G Series Specifications

General IconGeneral
Switching Capacity48 Gbps
Forwarding Rate35.7 Mpps
ManageableYes
Storage Temperature-40°C to 70°C
Ports24 x 10/100/1000 ports
Memory128 MB
Jumbo Frame SupportYes
LayerLayer 2
FeaturesVLAN, QoS, ACLs, IGMP snooping
ManagementWeb interface, CLI, SNMP
Security FeaturesRADIUS, TACACS+
Power SupplyInternal power supply
Operating Temperature0°C to 45°C
Power over Ethernet (PoE)Optional (PoE models available)

Summary

Getting Started

Introduction

Introduces the Access Security Guide and its purpose for ProCurve switches.

Overview of Access Security Features

Lists and briefly describes the security features covered in the guide.

Conventions

Explains the conventions used for command syntax and displayed information in the guide.

Sources for More Information

Directs users to additional resources for switch operation and features not covered.

Need Only a Quick Start?

Provides guidance for users who need basic setup and IP addressing instructions.

Configuring Username and Password Security

Overview

Explains the Manager and Operator console access levels and password configuration.

Configuring Local Password Security

Details how to set, delete, and recover local passwords for console access.

Front-Panel Security

Covers disabling front-panel buttons for password reset and factory default restoration.

Password Recovery

Describes the process for recovering lost passwords using ProCurve support.

Web and MAC Authentication

Overview

Introduces Web and MAC Authentication as edge network security features using RADIUS.

General Features

Lists key features of Web and MAC Authentication, including RADIUS use and VLAN assignment.

How Web and MAC Authentication Operate

Explains the authentication process for Web and MAC authentication methods.

General Setup Procedure for Web/MAC Authentication

Outlines the necessary steps before configuring Web or MAC authentication.

Configuring Web Authentication

Provides instructions for setting up Web-based authentication on switch ports.

Configuring MAC Authentication on the Switch

Details the steps for configuring MAC-based authentication on switch ports.

TACACS+ Authentication

Overview

Introduces TACACS+ for network-wide user access control using a central server.

General System Requirements

Lists the necessary components and configurations for TACACS+ authentication.

Configuring TACACS+ on the Switch

Covers commands and procedures for configuring the switch for TACACS+ operation.

How Authentication Operates

Explains the general process of TACACS+ authentication.

Messages Related to TACACS+ Operation

Lists and explains CLI messages related to TACACS+ operation.

RADIUS Authentication, Authorization and Accounting

Overview

Introduces RADIUS for user authentication, authorization, and accounting.

General RADIUS Setup Procedure

Details the preparation steps for configuring RADIUS authentication on the switch.

Configuring the Switch for RADIUS Authentication

Guides on configuring the switch to access RADIUS servers and authentication methods.

Commands Authorization

Explains how to authorize CLI commands for users based on RADIUS attributes.

Configuring RADIUS Accounting

Provides instructions for configuring RADIUS accounting to track user activity and system events.

Viewing RADIUS Statistics

Shows how to view RADIUS configuration, authentication, and accounting statistics.

Configuring Secure Shell (SSH)

Overview

Introduces SSHv2 for secure remote management via encrypted paths.

Prerequisite for Using SSH

Outlines the requirements for using SSH, including client application installation.

Steps for Configuring and Using SSH for Switch and Client Authentication

Details the steps for setting up SSH for both switch and client authentication.

General Operating Rules and Notes

Provides important rules and notes regarding SSH operation and security.

Configuring the Switch for SSH Operation

Guides on configuring SSH, including key generation and authentication methods.

Messages Related to SSH Operation

Lists and explains common CLI messages related to SSH operation.

Configuring Secure Socket Layer (SSL)

Overview

Introduces SSL/TLS for secure web transactions and server certificate authentication.

Terminology

Defines key terms related to SSL, certificates, and encryption.

Prerequisite for Using SSL

Lists requirements for using SSL, including browser application installation.

Steps for Configuring and Using SSL for Switch and Client Authentication

Details the steps for enabling SSL for switch and client authentication.

General Operating Rules and Notes

Provides important rules and notes for SSL operation and certificate management.

Common Errors in SSL Setup

Lists common errors encountered during SSL setup and their possible causes.

Configuring Port-Based and Client-Based Access Control (802.1X)

Overview

Introduces 802.1X for simplifying security management and providing access control.

General Features

Lists key features of 802.1X, including authenticator/supplicant roles and EAP/CHAP support.

Terminology

Defines terms related to 802.1X, VLANs, authenticators, and supplicants.

General Setup Procedure for 802.1X Access Control

Outlines the preparatory steps before configuring 802.1X operation.

Configuring Switch Ports as 802.1X Authenticators

Guides on enabling ports as 802.1X authenticators and specifying authentication types.

802.1X Open VLAN Mode

Explains the 802.1X Open VLAN mode for configuring unauthorized-client and authorized-client VLANs.

Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Devices

Details how to use port security with 802.1X authenticators to allow only specific devices.

Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches

Guides on configuring switch ports to act as supplicants for 802.1X connections.

Displaying 802.1X Configuration, Statistics, and Counters

Shows how to display 802.1X configuration, statistics, and counters.

How RADIUS/802.1X Authentication Affects VLAN Operation

Explains how RADIUS/802.1X authentication impacts VLAN assignments on ports.

Messages Related to 802.1X Operation

Lists and explains operating messages related to 802.1X.

Configuring and Monitoring Port Security

Overview

Introduces Port Security for defining authorized MAC addresses per port.

Basic Operation

Describes default port security operation and intruder protection mechanisms.

Blocking Unauthorized Traffic

Explains how switch security measures block unauthorized traffic without disabling ports.

Planning Port Security

Guides on planning port security configuration, monitoring, and actions.

Port Security Command Options and Operation

Details CLI commands for configuring port security, including learn modes and actions.

MAC Lockdown

Explains MAC Lockdown for permanent MAC address assignment to ports and VLANs.

Differences Between MAC Lockdown and Port Security

Compares MAC Lockdown and Port Security features and their implementation.

Reading Intrusion Alerts and Resetting Alert Flags

Covers how to read intrusion alerts, reset flags, and use the Intrusion Log.

Configuring Protected Ports

Explains how to configure protected ports to control inter-port communication.

Using Authorized IP Managers

Overview

Introduces the Authorized IP Managers feature for IP-based access control to the switch.

Configuration Options

Details configurable options for authorized manager addresses and access privileges.

Access Levels

Describes Manager and Operator access levels assigned to authorized stations.

Defining Authorized Management Stations

Explains how to authorize single stations or groups of stations for switch access.

Building IP Masks

Details how to use IP masks to define ranges of authorized IP addresses for management access.

Operating Notes

Provides important notes and security precautions for using Authorized IP Managers.

Related product manuals