EasyManua.ls Logo

HP Q.11. (2510-24) User Manual

HP Q.11. (2510-24)
294 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Access Security Guide
2510
www.procurve.com
ProCurve Switches
Q.11. (2510-24)
U.11. (2510-48)
XX
XX

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP Q.11. (2510-24) and is the answer not in the manual?

HP Q.11. (2510-24) Specifications

General IconGeneral
BrandHP
ModelQ.11. (2510-24)
CategorySwitch
LanguageEnglish

Summary

Getting Started

Introduction to Getting Started

Introduces the Access Security Guide and the ProCurve switches it supports.

Overview of Access Security Features

Summarizes the access security features detailed within the guide.

General Switch Traffic Security Guidelines

Provides guidelines for implementing security features on switch traffic.

Conventions Used in the Guide

Explains document conventions for command syntax and information display.

Configuring Username and Password Security

Overview of Console Access Security

Details console access levels (Manager/Operator) and password configuration options.

Configuring Local Password Security

Covers setting, deleting, and recovering local passwords via Menu, CLI, and Web.

Front-Panel Security Features

Explains how to secure the switch using front-panel buttons like Clear and Reset.

Password Recovery Process

Describes the procedure for recovering lost passwords and the implications of disabling this feature.

Web and MAC Authentication

Overview of Web and MAC Authentication

Introduces port-based security using RADIUS for Web and MAC authentication.

General Features of Web and MAC Authentication

Details features like RADIUS server integration, VLAN assignment, and client handling.

Configuring Web Authentication

Provides steps for setting up Web Authentication, including redirect URLs and SSL integration.

Configuring MAC Authentication on the Switch

Details the configuration of MAC Authentication, including address formats and VLANs.

TACACS+ Authentication

Overview of TACACS+ Authentication

Explains TACACS+ for centralized access control and user privilege management.

Terminology Used in TACACS Applications

Defines key terms and concepts associated with TACACS+ services.

Configuring the Switch’s Authentication Methods

Specifies how to set up authentication methods using local, TACACS+, or RADIUS.

Configuring the Switch’s TACACS+ Server Access

Details the configuration of TACACS+ server IP addresses, encryption keys, and timeouts.

RADIUS Authentication and Accounting

Overview of RADIUS Authentication and Accounting

Introduces RADIUS for user verification and tracking network resource usage.

General RADIUS Setup Procedure

Outlines the preparation and information gathering for RADIUS configuration.

Configuring the Switch for RADIUS Authentication

Provides steps to configure RADIUS authentication for various access methods.

Configuring RADIUS Accounting

Explains how to configure accounting types and send reports to a RADIUS server.

Configuring Secure Shell (SSH)

Overview of Secure Shell (SSH)

Introduces SSH for encrypted remote access to management functions.

Prerequisites for Using SSH

Details requirements for SSH server setup, including client applications and key generation.

Steps for Configuring and Using SSH

Provides a step-by-step guide for configuring SSH for switch and client authentication.

Configuring the Switch for SSH Operation

Covers password setup, key pair generation, and enabling SSH on the switch.

Configuring Secure Socket Layer (SSL)

Overview of Secure Socket Layer (SSL)

Introduces SSL/TLS for secure web transactions via encrypted paths.

Prerequisites for Using SSL

Details requirements for SSL server setup, including browser applications.

Generating the Switch’s Server Host Certificate

Explains how to generate self-signed or CA-signed certificates for SSL server identification.

Enabling SSL on the Switch

Covers enabling SSL via CLI/Web and how browsers interact with the SSL-enabled switch.

Configuring Port-Based and Client-Based Access Control (802.1X)

Overview of 802.1X Access Control

Introduces 802.1X for network access control, simplifying security management.

User Authentication Methods for 802.1X

Explains Port-Based and Client-Based methods for 802.1X access control.

Configuring Switch Ports as 802.1X Authenticators

Details steps to enable and configure 802.1X authentication on switch ports.

802.1X Open VLAN Mode

Describes configuring Open VLAN mode for unauthorized and authorized client VLANs.

Configuring and Monitoring Port Security

Overview of Port Security

Introduces Port Security for controlling network access via MAC addresses.

Basic Operation of Port Security

Explains default settings and intruder protection mechanisms for Port Security.

Configuring Port Security Operation

Covers CLI commands for port security, authorized addresses, and security actions.

Reading Intrusion Alerts and Resetting Alert Flags

Details how to check and clear intrusion alerts and manage the Intrusion Log.

Using Authorized IP Managers

Overview of Authorized IP Managers

Explains how IP addresses and masks control switch access for management stations.

Defining Authorized Management Stations

Covers authorizing single stations or groups using IP addresses and masks.

Building IP Masks for IP Management

Details how IP mask parameters control the recognition of authorized IP addresses.

Operating Notes for Authorized IP Managers

Provides security precautions, proxy server handling, and duplicate IP address considerations.

Related product manuals