Do you have a question about the ProCurve 2900 and is the answer not in the manual?
| Form Factor | Rack-mountable |
|---|---|
| Power over Ethernet (PoE) | No |
| Jumbo Frame Support | Yes |
| Uplinks | 4 x SFP |
| Routing Protocol | Static routing |
| Remote Management Protocol | SNMP, CLI |
| Management | Web, CLI, SNMP |
| Features | VLAN support, QoS, ACLs |
| Compliant Standards | IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z |
| Power | 100-240 VAC, 50-60 Hz |
Provides an overview of potential threats and guidelines for preventing unauthorized access.
Provisions for protecting access to the switch’s status and configuration settings.
Features to prevent unauthorized management access to the switch.
Features for protecting access through the switch to the network.
Configures and maintains key chains for KMS-capable routing protocols.
Covers setting, deleting, and recovering local passwords via menu, CLI, and web.
Details on storing and displaying security credentials like passwords and keys in config files.
Features to enable/disable front-panel buttons for security functions.
Details on features for web and MAC authentication methods.
Explains the client authentication process via RADIUS server.
Steps to configure Web/MAC authentication, including RADIUS server setup.
Steps and commands to configure web authentication on switch ports.
Steps and commands to configure MAC authentication on switch ports.
Explains TACACS+ authentication for centralized access control.
Lists requirements for using TACACS+ authentication.
Outlines steps for testing and implementing TACACS+ authentication.
Details on configuring TACACS+ server access, authentication methods, and parameters.
Explains the general process of authentication using a TACACS+ server.
Explains RADIUS for user identity verification and network resource usage tracking.
Details supported primary password access methods for ProCurve switch.
RADIUS accounting collects resource consumption data for trend analysis and planning.
Steps for preparing and configuring RADIUS on the switch.
Commands and steps to configure switch for RADIUS authentication.
Steps and commands for configuring accounting data collection and reporting.
Explains SSHv2 for secure remote access and its authentication types.
Defines SSH Server, Key Pair, PEM, Private/Public Key, Enable/Login Levels.
General steps for setting up two-way authentication between switch and SSH client.
Covers assigning local passwords, generating key pairs, enabling SSH, and authentication.
Details on client public-key authentication steps and requirements.
Explains SSLv3/TLSv1 for secure remote web access via encrypted paths.
Defines SSL Server, Key Pair, Digital Certificate, Self-Signed, CA-Signed Certificates.
General steps for configuring SSL, including client and switch preparation.
Covers assigning local passwords, generating server certificates, and enabling SSL.
Lists common errors during SSL setup and their possible causes.
Explains enhancing security and control using static filters.
Describes static filter types: Source-Port, Multicast, and Protocol.
Procedure to specify filter types, actions (forward/drop), and configure filters.
Details on defining, configuring, and applying source-port filters.
Steps for configuring multicast and protocol traffic filters.
Lists filters by index and displays details of individual filters.
Features and general information about 802.1X access control.
Compares Port-Based and User-Based access control methods.
Provides port-level security for a single 802.1X-capable client.
Steps for configuring 802.1X operation, including local passwords and RADIUS server.
Steps to enable selected ports as authenticators and configure authentication.
Provides a path for clients to acquire supplicant software before authentication.
Enables configuration of each switch port with authorized MAC addresses.
Permanent assignment of MAC address and VLAN to a specific port.
Configures MAC address on all ports and VLANs for a switch to drop traffic.
Explains how the Intrusion Log operates and how to reset alert flags.
Uses IP addresses and masks to determine which stations can access the switch.
Assigns Manager or Operator access levels for Telnet, SNMPv1, SNMPv2c.
Authorizes single stations or groups of stations using IP addresses and masks.
Controls how the switch uses Authorized Manager IP values to recognize station IP addresses.
Centralizes configuration and maintenance of security information for routing protocols.
Defines Key Chain, Time-Independent/Dependent Keys, KMS Enabled Protocol.
Steps to create key chain entries, assign keys, and assign chains to KMS-enabled protocols.
Procedures for creating and deleting key chain entries for KMS.
Assigns keys with no time constraints, valid from boot-up until changed.
Assigns keys with activate/deactivate time constraints, which expire.