EasyManua.ls Logo

HPE OfficeConnect 1950 Series - Page 5

HPE OfficeConnect 1950 Series
182 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
iii
FTP ·································································································································································· 57
Telnet ······························································································································································· 57
NTP ·································································································································································· 57
SNMP ······························································································································································· 57
MIB ··························································································································································· 57
SNMP versions ········································································································································ 58
SNMP access control ······························································································································· 58
Resources features ······················································································· 60
ACL ·································································································································································· 60
ACL types and match criteria ··················································································································· 60
Match order ·············································································································································· 60
Rule numbering ········································································································································ 61
Time range ······················································································································································· 62
SSL ·································································································································································· 62
Public key ························································································································································· 62
Managing local key pairs ·························································································································· 63
Managing peer public keys ······················································································································ 63
PKI ··································································································································································· 64
PKI architecture ········································································································································ 64
Managing certificates ······························································································································· 65
Certificate access control ································································································································· 66
Certificate access control policies ············································································································ 66
Attribute groups ········································································································································ 66
QoS features ································································································· 68
QoS policies ····················································································································································· 68
Traffic class ·············································································································································· 68
Traffic behavior ········································································································································ 68
QoS policy ················································································································································ 68
Applying a QoS policy ······························································································································ 68
Hardware queuing ············································································································································ 68
SP queuing ··············································································································································· 69
WRR queuing ··········································································································································· 69
WFQ queuing ··········································································································································· 70
Queue scheduling profile ························································································································· 71
Priority mapping ··············································································································································· 71
Port priority ··············································································································································· 71
Priority map ·············································································································································· 72
Rate limit ·························································································································································· 72
Security features ··························································································· 73
Packet filter ······················································································································································ 73
IP source guard ················································································································································ 73
Overview ·················································································································································· 73
Interface-specific static IPv4SG bindings ································································································· 73
802.1X ······························································································································································ 73
802.1X architecture ·································································································································· 73
802.1X authentication methods ················································································································ 74
Access control methods ··························································································································· 74
Port authorization state ···························································································································· 74
Periodic online user reauthentication ······································································································· 74
Online user handshake ···························································································································· 75
Authentication trigger ······························································································································· 75
Auth-Fail VLAN ········································································································································ 75
Guest VLAN ············································································································································· 76
Critical VLAN ············································································································································ 76
Mandatory authentication domain ············································································································ 77
EAD assistant ··········································································································································· 77
MAC authentication ·········································································································································· 77
Overview ·················································································································································· 77
MAC authentication configuration on a port ····························································································· 78

Table of Contents

Other manuals for HPE OfficeConnect 1950 Series

Related product manuals