EasyManua.ls Logo

HPE FlexNetwork MSR Series

HPE FlexNetwork MSR Series
547 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
iv
Hardware compatibility with EAD fast deployment ························································································ 108
Configuration prerequisites ···························································································································· 109
Configuring a free IP ······································································································································ 109
Configuring the redirect URL ························································································································· 109
Setting the EAD rule timer ····························································································································· 109
Displaying and maintaining EAD fast deployment ························································································· 110
EAD fast deployment configuration example ································································································· 110
Network requirements ···························································································································· 110
Configuration procedure ························································································································· 111
Verifying the configuration ······················································································································ 112
Troubleshooting EAD fast deployment ·········································································································· 112
Web browser users cannot be correctly redirected ················································································ 112
Configuring MAC authentication ································································· 114
Overview ························································································································································ 114
User account policies ····························································································································· 114
Authentication methods ·························································································································· 114
MAC authentication timers ····················································································································· 115
Using MAC authentication with other features ······························································································· 115
VLAN assignment ·································································································································· 115
ACL assignment ····································································································································· 115
Configuration task list ····································································································································· 116
Basic configuration for MAC authentication ··································································································· 116
Configuring MAC authentication globally ······························································································· 116
Configuring MAC authentication on a port ····························································································· 117
Specifying a MAC authentication domain ······································································································ 118
Configuring MAC authentication delay ··········································································································· 118
Displaying and maintaining MAC authentication ···························································································· 119
MAC authentication configuration examples ·································································································· 119
Local MAC authentication configuration example ·················································································· 119
RADIUS-based MAC authentication configuration example ·································································· 120
ACL assignment configuration example································································································· 122
Configuring port security ············································································· 125
Overview ························································································································································ 125
Port security features ····························································································································· 125
Port security modes ······························································································································· 125
Support for WLAN ·································································································································· 128
Working with guest VLAN and Auth-Fail VLAN ······················································································ 129
Configuration task list ····································································································································· 129
Enabling port security ···································································································································· 129
Setting port security's limit on the number of MAC addresses on a port ······················································· 130
Setting the port security mode ······················································································································· 130
Configuration prerequisites ···················································································································· 131
Configuration procedure ························································································································· 131
Configuring port security features ·················································································································· 132
Configuring NTK ····································································································································· 132
Configuring intrusion protection ············································································································· 133
Enabling port security traps ···················································································································· 133
Configuring secure MAC addresses ·············································································································· 134
Configuration prerequisites ···················································································································· 135
Configuration procedure ························································································································· 135
Configuring port security for WLAN ports ······································································································ 135
Setting the port security mode of a WLAN port ······················································································ 136
Enabling key negotiation ························································································································ 136
Configuring a PSK ·································································································································· 137
Ignoring authorization information from the server ························································································ 137
Displaying and maintaining port security ······································································································· 137
Port security configuration examples ············································································································· 138
Configuring the autoLearn mode ············································································································ 138
Configuring the userLoginWithOUI mode ······························································································ 140
Configuring the macAddressElseUserLoginSecure mode ····································································· 144

Table of Contents

Other manuals for HPE FlexNetwork MSR Series

Related product manuals