EasyManuals Logo

HPE FlexNetwork 5510 HI Series Security Configuration Guide

HPE FlexNetwork 5510 HI Series
551 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #12 background imageLoading...
Page #12 background image
x
Configuration restrictions and guidelines ····················································································· 444
Configuring FIPS mode ··········································································································· 445
Entering FIPS mode ········································································································· 445
Configuration changes in FIPS mode ··················································································· 446
Exiting FIPS mode ··········································································································· 447
FIPS self-tests ······················································································································· 447
Power-up self-tests ·········································································································· 448
Conditional self-tests ········································································································ 448
Triggering self-tests ········································································································· 449
Displaying and maintaining FIPS ······························································································· 449
FIPS configuration examples ···································································································· 449
Entering FIPS mode through automatic reboot ······································································· 449
Entering FIPS mode through manual reboot ·········································································· 450
Exiting FIPS mode through automatic reboot ········································································· 452
Exiting FIPS mode through manual reboot ············································································ 452
Configuring user profiles ································································ 454
Overview ······························································································································ 454
Configuration task list·············································································································· 454
Configuration restrictions and guidelines ····················································································· 454
Creating a user profile ············································································································· 454
Configuring parameters for a user profile ···················································································· 455
Configuring QoS parameters for traffic management ······························································· 455
Displaying and maintaining user profiles ····················································································· 455
User profile configuration examples ··························································································· 455
Local 802.1X authentication/authorization with QoS policy configuration example ························· 455
Configuring attack detection and prevention ······································· 460
Overview ······························································································································ 460
Configuring TCP fragment attack prevention ················································································ 460
Configuring MACsec ····································································· 461
Overview ······························································································································ 461
Basic concepts ··············································································································· 461
MACsec services ············································································································ 461
MACsec applications ········································································································ 462
MACsec operating mechanism ··························································································· 462
Protocols and standards ··································································································· 464
Compatibility information ········································································································· 464
Feature and hardware compatibility ····················································································· 464
Feature and software version compatibility ············································································ 464
MACsec configuration task list ·································································································· 465
Enabling MKA ······················································································································· 465
Enabling MACsec desire ········································································································· 465
Configuring a preshared key ····································································································· 466
Configuring the MKA key server priority ······················································································ 466
Configuring MACsec protection parameters in interface view ··························································· 467
Configuring the MACsec confidentiality offset ········································································ 467
Configuring MACsec replay protection ················································································· 468
Configuring the MACsec validation mode ············································································· 468
Configuring MACsec protection parameters by MKA policy ····························································· 468
Configuring an MKA policy ································································································ 468
Applying an MKA policy ···································································································· 469
Displaying and maintaining MACsec ·························································································· 469
MACsec configuration examples ······························································································· 470
Client-oriented MACsec configuration example ······································································ 470
Device-oriented MACsec configuration example ···································································· 473
Troubleshooting MACsec ········································································································· 476
Configuring ND attack defense ························································ 477
Overview ······························································································································ 477
Feature and software version compatibility ·················································································· 477

Table of Contents

Other manuals for HPE FlexNetwork 5510 HI Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HPE FlexNetwork 5510 HI Series and is the answer not in the manual?

HPE FlexNetwork 5510 HI Series Specifications

General IconGeneral
BrandHPE
ModelFlexNetwork 5510 HI Series
CategorySwitch
LanguageEnglish

Related product manuals