EasyManua.ls Logo

HP ProCurve 3500yl Series User Manual

HP ProCurve 3500yl Series
390 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
6200yl
Access Security Guide
5400zl
3500yl
ProCurve Switches
K.11.XX
www.procurve.com

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP ProCurve 3500yl Series and is the answer not in the manual?

HP ProCurve 3500yl Series Specifications

General IconGeneral
ModelHP ProCurve 3500yl Series
Switching Capacity176 Gbps
LayerLayer 3
Input Voltage100-240 VAC
PoEAvailable on some models
ManagementWeb, CLI, SNMP
Routing ProtocolRIP, OSPF, BGP
Remote Management ProtocolTelnet
FeaturesVLAN
Power Consumption OperationalVaries by model
Memory256 MB
Power SupplyInternal
Security Features802.1X, RADIUS, TACACS+
Ports24 or 48 x 10/100/1000Base-T ports

Summary

1 Getting Started

General Switch Traffic Security Guideline

Explains the OSI model precedence for implementing security features on traffic.

2 Configuring Username and Password Security

Configuring Local Password Security

Details how to configure local password security via menu, CLI, and web interfaces.

Front-Panel Security

Covers features related to the switch's front-panel buttons for security management.

Disabling the Clear Password Function of the Clear Button on the Switch’s Front Panel

Details the procedure to disable the password-clearing function of the Clear button.

Password Recovery

Describes the password recovery feature and its requirements.

3 Virus Throttling

General Operation of Connection-Rate Filtering

Describes how connection-rate filtering works to detect and respond to malicious traffic.

Basic Connection-Rate Filtering Configuration

Covers enabling connection-rate filtering and applying policies on a per-port basis.

Global and Per-Port Configuration

Details commands to enable connection-rate filtering globally and per-port.

Enabling Connection-Rate Filtering and Configuring Sensitivity

Explains the syntax and options for enabling filtering and setting global sensitivity levels.

Configuring the Per-Port Filtering Mode

Describes how to set per-port policies like notify-only, throttle, and block.

Viewing and Managing Connection-Rate Status

Shows how to view current configuration, status, and blocked hosts.

Listing and Unblocking the Currently-Blocked Hosts

Explains how to list and unblock hosts affected by connection-rate filtering.

Configuring and Applying Connection-Rate ACLs

Details how to configure and apply Access Control Lists for connection-rate filtering exceptions.

Configuring a Connection-Rate ACL Using Source IP Address Criteria

Covers configuring ACLs based on source IP address criteria.

Configuring a Connection-Rate ACL Using UDP/TCP Criteria

Details configuring ACLs using UDP/TCP criteria.

4 Web and MAC Authentication

How Web and MAC Authentication Operate

Explains the operational flow of authenticator operation, Web-based, and MAC-based authentication.

Web-based Authentication

Details the process of authenticating users via a web page login.

MAC-based Authentication

Explains how devices are authenticated using their MAC addresses via a RADIUS server.

General Setup Procedure for Web/MAC Authentication

Outlines the steps required before configuring Web/MAC authentication.

Configuring the Switch To Access a RADIUS Server

Details the commands and procedures to configure the switch to access a RADIUS server.

Configuring Web Authentication on the Switch

Covers the steps and considerations for setting up Web authentication on switch ports.

Configure the Switch for Web-Based Authentication

Lists the commands and parameters for configuring Web-based authentication.

Configuring MAC Authentication on the Switch

Details the steps for configuring MAC authentication on switch ports.

Configure the Switch for MAC-Based Authentication

Lists the commands and parameters for configuring MAC-based authentication.

5 TACACS+ Authentication

Configuring TACACS+ on the Switch

Covers the steps and commands for configuring TACACS+ authentication on the switch.

Configuring the Switch’s Authentication Methods

Describes how to configure access control for console and Telnet using AAA authentication.

Configuring the Switch’s TACACS+ Server Access

Covers the configuration parameters for the switch to access TACACS+ servers.

6 RADIUS Authentication and Accounting

General RADIUS Setup Procedure

Provides a general procedure for preparing and configuring RADIUS on the switch.

Configuring the Switch for RADIUS Authentication

Details the steps for configuring RADIUS authentication for various access methods.

1. Configure Authentication for the Access Methods You Want RADIUS To Protect

Guides on configuring RADIUS for serial port, Telnet, SSH, and web access.

3. Configure the Switch To Access a RADIUS Server

Covers configuring the switch to interact with RADIUS servers for authentication and accounting.

4. Configure the Switch’s Global RADIUS Parameters

Details the configuration of global RADIUS parameters like timeout and retransmit attempts.

Configuring RADIUS Accounting

Outlines the steps to configure RADIUS accounting on the switch.

Steps for Configuring RADIUS Accounting

Provides a step-by-step guide for configuring RADIUS accounting.

2. Configure Accounting Types and the Controls for Sending Reports to the RADIUS Server

Explains how to configure accounting types (exec, network, system) and report triggers.

7 Configuring Secure Shell (SSH)

Steps for Configuring and Using SSH for Switch and Client Authentication

Outlines the steps for configuring SSH for two-way authentication.

Configuring the Switch for SSH Operation

Details the process of configuring the switch for SSH operation.

2. Generating the Switch’s Public and Private Key Pair

Explains how to generate the necessary RSA host key pair for SSH on the switch.

3. Providing the Switch’s Public Key to Clients

Details methods for copying the switch’s public key to client "known hosts" files for secure access.

4. Enabling SSH on the Switch and Anticipating SSH Client Contact Behavior

Covers enabling SSH and understanding client connection behavior, including security prompts.

5. Configuring the Switch for SSH Authentication

Explains how to configure SSH authentication methods for login and enable access levels.

8 Configuring Secure Socket Layer (SSL)

Steps for Configuring and Using SSL for Switch and Client Authentication

Outlines the general steps for SSL configuration and client authentication.

Configuring the Switch for SSL Operation

Details the process of configuring the switch for SSL operation.

2. Generating the Switch’s Server Host Certificate

Explains how to generate a server host certificate for SSL.

Generate a Self-Signed Host Certificate with the Web browser interface

Guides on generating a self-signed host certificate using the web browser interface.

Generate a CA-Signed server host certificate with the Web browser interface

Details the process of generating a CA-signed server host certificate via the web interface.

3. Enabling SSL on the Switch and Anticipating SSL Browser Contact Behavior

Covers enabling SSL and understanding browser interaction after configuration.

9 Traffic/Security Filters

Source-Port Filters

Explains how source-port filters enable forwarding or dropping traffic based on source port.

Named Source-Port Filters

Describes how to specify named source-port filters for use on multiple ports and trunks.

Defining and Configuring Named Source-Port Filters

Details the CLI commands for defining and configuring named source-port filters.

Configuring Traffic/Security Filters

Details the procedure for specifying filter types and actions on the switch.

Configuring a Source-Port Traffic Filter

Guides on configuring source-port traffic filters using the `filter` command.

10 Configuring Port-Based and Client-Based Access Control (802.1X)

802.1X Client-Based Access Control

Explains client-level security allowing LAN access via valid user credentials.

802.1X Port-Based Access Control

Describes port-level security recommended for applications with single client per port access.

General Setup Procedure for 802.1X Access Control

Outlines the steps required before configuring 802.1X operation.

Overview: Configuring 802.1X Authentication on the Switch

Outlines the steps for configuring 802.1X authentication on the switch.

Configuring Switch Ports as 802.1X Authenticators

Details how to configure switch ports to operate as 802.1X authenticators.

1. Enable 802.1X Authentication on Selected Ports

Covers enabling 802.1X authentication on specific ports for authenticator operation.

11 Configuring and Monitoring Port Security

Port Security

Covers the core functionality of port security for authorizing devices and detecting violations.

Port Security Command Options and Operation

Details CLI commands for configuring port security and acquiring authorized addresses.

Configuring Port Security

Covers configuring port security, editing settings, and clearing intrusion flags.

MAC Lockdown

Covers MAC Lockdown (static addressing) for preventing MAC address hijacking and controlling address learning.

MAC Lockout

Explains MAC Lockout as a simple blacklist to drop traffic to/from specified MAC addresses.

Reading Intrusion Alerts and Resetting Alert Flags

Covers how the switch handles and notifies about security violations and intrusion alerts.

Keeping the Intrusion Log Current by Resetting Alert Flags

Explains the importance of resetting alert flags to manage intrusion log entries.

12 Using Authorized IP Managers

Defining Authorized Management Stations

Details how to authorize single stations or groups of stations via IP addresses and masks.

Configuring IP Authorized Managers for the Switch

Covers the syntax and parameters for configuring IP authorized managers.

Building IP Masks

Explains how IP mask parameters control the use of Authorized Manager IP values.

13 Key Management System

Configuring Key Chain Management

Details the steps for configuring key chains within the KMS.

Related product manuals