EasyManua.ls Logo

ProCurve 2900 - User Manual

Default Icon
432 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Access Security Guide
ProCurve Switches
T.13.01
2900
www.procurve.com

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ProCurve 2900 and is the answer not in the manual?

ProCurve 2900 Specifications

General IconGeneral
Form FactorRack-mountable
Power over Ethernet (PoE)No
Jumbo Frame SupportYes
Uplinks4 x SFP
Routing ProtocolStatic routing
Remote Management ProtocolSNMP, CLI
ManagementWeb, CLI, SNMP
FeaturesVLAN support, QoS, ACLs
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z
Power100-240 VAC, 50-60 Hz

Summary

Security Overview

Introduction

Provides an overview of potential threats and guidelines for preventing unauthorized access.

Switch Access Security

Provisions for protecting access to the switch’s status and configuration settings.

Other Provisions for Management Access Security

Features to prevent unauthorized management access to the switch.

Network Security Features

Features for protecting access through the switch to the network.

Key Management System (KMS)

Configures and maintains key chains for KMS-capable routing protocols.

Configuring Username and Password Security

Configuring Local Password Security

Covers setting, deleting, and recovering local passwords via menu, CLI, and web.

Saving Security Credentials in a Config File

Details on storing and displaying security credentials like passwords and keys in config files.

Front-Panel Security

Features to enable/disable front-panel buttons for security functions.

Web and MAC Authentication

Overview

Details on features for web and MAC authentication methods.

How Web and MAC Authentication Operate

Explains the client authentication process via RADIUS server.

Setup Procedure for Web;MAC Authentication

Steps to configure Web/MAC authentication, including RADIUS server setup.

Configuring Web Authentication

Steps and commands to configure web authentication on switch ports.

Configuring MAC Authentication on the Switch

Steps and commands to configure MAC authentication on switch ports.

TACACS+ Authentication

Overview

Explains TACACS+ authentication for centralized access control.

General System Requirements

Lists requirements for using TACACS+ authentication.

General Authentication Setup Procedure

Outlines steps for testing and implementing TACACS+ authentication.

Configuring TACACS+ on the Switch

Details on configuring TACACS+ server access, authentication methods, and parameters.

How Authentication Operates

Explains the general process of authentication using a TACACS+ server.

RADIUS Authentication and Accounting

Overview

Explains RADIUS for user identity verification and network resource usage tracking.

Authentication Services

Details supported primary password access methods for ProCurve switch.

Accounting Services

RADIUS accounting collects resource consumption data for trend analysis and planning.

General RADIUS Setup Procedure

Steps for preparing and configuring RADIUS on the switch.

Configuring the Switch for RADIUS Authentication

Commands and steps to configure switch for RADIUS authentication.

Configuring RADIUS Accounting

Steps and commands for configuring accounting data collection and reporting.

Configuring Secure Shell (SSH)

Overview

Explains SSHv2 for secure remote access and its authentication types.

Terminology

Defines SSH Server, Key Pair, PEM, Private/Public Key, Enable/Login Levels.

Steps for Configuring and Using SSH for Switch and Client Authentication

General steps for setting up two-way authentication between switch and SSH client.

Configuring the Switch for SSH Operation

Covers assigning local passwords, generating key pairs, enabling SSH, and authentication.

Further Information on SSH Client Public-Key Authentication

Details on client public-key authentication steps and requirements.

Configuring Secure Socket Layer (SSL)

Overview

Explains SSLv3/TLSv1 for secure remote web access via encrypted paths.

Terminology

Defines SSL Server, Key Pair, Digital Certificate, Self-Signed, CA-Signed Certificates.

Steps for Configuring and Using SSL for Switch and Client Authentication

General steps for configuring SSL, including client and switch preparation.

Configuring the Switch for SSL Operation

Covers assigning local passwords, generating server certificates, and enabling SSL.

Common Errors in SSL setup

Lists common errors during SSL setup and their possible causes.

Traffic;Security Filters and Monitors

Introduction

Explains enhancing security and control using static filters.

Filter Types and Operation

Describes static filter types: Source-Port, Multicast, and Protocol.

Configuring Traffic;Security Filters

Procedure to specify filter types, actions (forward/drop), and configure filters.

Configuring a Source-Port Traffic Filter

Details on defining, configuring, and applying source-port filters.

Configuring a Multicast or Protocol Traffic Filter

Steps for configuring multicast and protocol traffic filters.

Displaying Traffic;Security Filters

Lists filters by index and displays details of individual filters.

Configuring Port-Based and User-Based Access Control (802.1 X)

Overview

Features and general information about 802.1X access control.

User Authentication Methods

Compares Port-Based and User-Based access control methods.

802.1 X Port-Based Access Control

Provides port-level security for a single 802.1X-capable client.

General Setup Procedure for 802.1 X Access Control

Steps for configuring 802.1X operation, including local passwords and RADIUS server.

Configuring Switch Ports as 802.1 X Authenticators

Steps to enable selected ports as authenticators and configure authentication.

802.1 X Open VLAN Mode

Provides a path for clients to acquire supplicant software before authentication.

Configuring and Monitoring Port Security

Port Security

Enables configuration of each switch port with authorized MAC addresses.

MAC Lockdown

Permanent assignment of MAC address and VLAN to a specific port.

MAC Lockout

Configures MAC address on all ports and VLANs for a switch to drop traffic.

Reading Intrusion Alerts and Resetting Alert Flags

Explains how the Intrusion Log operates and how to reset alert flags.

Using Authorized IP Managers

Overview

Uses IP addresses and masks to determine which stations can access the switch.

Access Levels

Assigns Manager or Operator access levels for Telnet, SNMPv1, SNMPv2c.

Defining Authorized Management Stations

Authorizes single stations or groups of stations using IP addresses and masks.

Building IP Masks

Controls how the switch uses Authorized Manager IP values to recognize station IP addresses.

Key Management System

Overview

Centralizes configuration and maintenance of security information for routing protocols.

Terminology

Defines Key Chain, Time-Independent/Dependent Keys, KMS Enabled Protocol.

Configuring Key Chain Management

Steps to create key chain entries, assign keys, and assign chains to KMS-enabled protocols.

Creating and Deleting Key Chain Entries

Procedures for creating and deleting key chain entries for KMS.

Assigning a Time-Independent Key to a Chain

Assigns keys with no time constraints, valid from boot-up until changed.

Assigning Time-Dependent Keys to a Chain

Assigns keys with activate/deactivate time constraints, which expire.

Related product manuals