EasyManua.ls Logo

ProCurve 2610 - Configuring and Monitoring Port Security; Overview; Basic Operation; Eavesdrop Protection

ProCurve 2610
454 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10
11
Traffic/Security Filters
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
General Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Applying a Source Port Filter in a Multinetted VLAN . . . . . . . . . . . . . 10-3
Using Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
Operating Rules for Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . 10-4
Configuring a Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Viewing a Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7
Filter Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9
Editing a Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9
Using Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
Configuring Port-Based and
User-Based Access Control (802.1X)
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 11-3
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 11-9
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12
General Setup Procedure for 802.1X Access Control . . . . . . . . . . . . . . . 11-14
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 11-14
Overview: Configuring 802.1X Authentication on the Switch . . . . . 11-16
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . . . . . . 11-17
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 11-18
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . 11-20
3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . 11-24
4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . 11-25
8

Table of Contents

Related product manuals