EasyManua.ls Logo

HP Q.11.XX User Manual

HP Q.11.XX
318 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Access Security Guide
2510
www.procurve.com
ProCurve Switches
Q.11.XX (2510-24)
U.11.XX (2510-48)

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP Q.11.XX and is the answer not in the manual?

HP Q.11.XX Specifications

General IconGeneral
BrandHP
ModelQ.11.XX
CategorySwitch
LanguageEnglish

Summary

1 Getting Started

Introduction to Access Security

Provides an overview of the guide's purpose and supported switches.

Overview of Access Security Features

Covers key security features including passwords, TACACS+, RADIUS, SSH, SSL, 802.1X.

General Switch Traffic Security Guidelines

Details the order of precedence for security features affecting traffic flow on ports.

Command Conventions and Syntax

Explains conventions for command syntax, including boldface, italics, and bracket usage.

2 Configuring Username and Password Security

Overview of Password Security Configuration

Explains console access levels (Manager, Operator) and password management.

Configuring Local Password Security via Menu

Details how to set, delete, and recover passwords using the switch's menu interface.

Configuring Local Password Security via CLI

Explains how to set and remove passwords and usernames using Command Line Interface.

Front-Panel Security Features

Describes disabling front-panel buttons (Clear, Reset) to prevent unauthorized access or configuration changes.

3 Web and MAC Authentication

Overview of Web and MAC Authentication

Introduces edge network security using RADIUS for Web and MAC authentication.

General Features of Web/MAC Authentication

Details features like RADIUS usage, VLAN assignment, and client requirements for Web/MAC auth.

How Web and MAC Authentication Operate

Explains the process of client authentication via Web page login or MAC address submission to RADIUS.

Configuring Web Authentication

Provides steps for configuring Web Authentication, including redirect URLs and SSL integration.

4 TACACS+ Authentication

Overview of TACACS+ Authentication

Explains TACACS+ usage for central server-based access control for switches and other devices.

General System Requirements for TACACS+

Lists necessary components like a TACACS+ server application and a configured switch for authentication.

Configuring TACACS+ Authentication Methods

Configures TACACS+ access control for Console, Telnet, and SSH, specifying primary/secondary methods.

Configuring TACACS+ Server Access

Details configuring host IP addresses, encryption keys, and timeout values for TACACS+ servers.

5 RADIUS Authentication, Authorization and Accounting

Overview of RADIUS

Introduces RADIUS for user authentication, authorization, and accounting, supporting multiple servers.

General RADIUS Setup Procedure

Outlines preparation steps including configuring RADIUS servers and determining access methods.

Configuring Commands Authorization with RADIUS

Explains how to limit user access to CLI commands via RADIUS authorization using HP VSAs.

Configuring RADIUS Accounting

Details collecting user activity and system event data and sending it to a RADIUS server for analysis.

6 Configuring Secure Shell (SSH)

Overview of SSH

Explains SSHv2 for secure remote management access via encrypted paths between switch and clients.

Prerequisite for Using SSH

Requires installation of an SSH client application with key generation/import capabilities for management access.

Steps for Configuring SSH for Switch and Client Authentication

Details client preparation and switch preparation for SSH, including key pair generation and enabling SSH.

Further Information on SSH Client Public-Key Authentication

Provides in-depth details on client public-key authentication, including key storage and transfer.

7 Configuring Secure Socket Layer (SSL)

Overview of SSL

Introduces SSL/TLS for secure web transactions, providing encrypted and authenticated access to switches.

Prerequisite for Using SSL

Requires installation of an SSL-enabled browser for management access to the switch.

Steps for Configuring and Using SSL for Switch and Client Authentication

Covers client preparation and switch preparation for SSL, including certificate generation and enabling SSL.

Common Errors in SSL Setup

Lists common errors during SSL setup and their possible causes for CLI and web interface usage.

8 Configuring Port-Based and Client-Based Access Control (802.1X)

Overview of 802.1X Access Control

Explains 802.1X for simplified security management and access control via RADIUS servers.

General Setup Procedure for 802.1X Access Control

Outlines steps for configuring 802.1X, including local credentials, RADIUS servers, and port settings.

Configuring Switch Ports as 802.1X Authenticators

Details enabling 802.1X authentication on ports and specifying client-based or port-based methods.

802.1X Open VLAN Mode

Explains configuring unauthorized-client and authorized-client VLANs for ports configured as 802.1X authenticators.

9 Configuring and Monitoring Port Security

Overview of Port Security

Introduces port security for creating authorized MAC address lists per port to detect and block unauthorized traffic.

Planning Port Security Configuration

Guides on planning port security by defining ports, authorized devices, and desired security actions.

Port Security Command Options and Operation

Details CLI commands for configuring port security, including learn modes, address limits, and actions.

MAC Lockdown Overview and Operation

Explains MAC Lockdown as static addressing to prevent station movement and MAC hijacking.

10 Using Authorized IP Managers

Overview of Authorized IP Manager Features

Describes using IP addresses and masks to determine which stations can access the switch via network.

Defining Authorized Management Stations

Explains how to authorize single stations or groups of stations using IP addresses and masks.

Building IP Masks for Authorized Access

Details how the IP Mask parameter controls the recognition of authorized manager station IP addresses.

Related product manuals