HP Q.11. (2510-24) Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Software HP Q.11. (2510-24). HP Q.11. (2510-24) User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 294
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - ProCurve Switches

Access Security Guide2510www.procurve.comProCurve SwitchesQ.11. (2510-24)U.11. (2510-48)XXXX

Página 2

viiiGeneral Setup Procedure for 802.1X Access Control . . . . . . . . . . . . . . . . 8-14Do These Steps Before You Configure 802.1X Operation . .

Página 3 - Access Security Guide

4-26TACACS+ AuthenticationConfiguring TACACS+ on the Switch When TACACS+ is not enabled on the switch—or when the switch’s only designated TACACS+ se

Página 4

5-15RADIUS Authentication and AccountingContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 5

5-2RADIUS Authentication and AccountingOverviewOverviewRADIUS (Remote Authentication Dial-In User Service) enables you to use up to three servers (one

Página 6 - 3 Web and MAC Authentication

5-3RADIUS Authentication and AccountingTerminologyTerminologyCHAP (Challenge-Handshake Authentication Protocol): A challenge-response authentication p

Página 7 - 4 TACACS+ Authentication

5-4RADIUS Authentication and AccountingSwitch Operating Rules for RADIUSSwitch Operating Rules for RADIUS You must have at least one RADIUS server ac

Página 8

5-5RADIUS Authentication and AccountingGeneral RADIUS Setup ProcedureGeneral RADIUS Setup ProcedurePreparation:1. Configure one to three RADIUS server

Página 9

5-6RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationConfiguring the Switch for RADIUS Authentication• Determine whe

Página 10

5-7RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationOutline of the Steps for Configuring RADIUS AuthenticationThere

Página 11

5-8RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authenticationout on a server that is unavailable. If you want to use this fe

Página 12

5-9RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have already configured local password

Página 13 - Product Documentation

ix9 Configuring and Monitoring Port SecurityContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 14 - Feature Index

5-10RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication2. Configure the Switch To Access a RADIUS ServerThis section

Página 15

5-11RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose you have configured the switch as shown i

Página 16

5-12RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication3. Configure the Switch’s Global RADIUS ParametersYou can conf

Página 17 - Getting Started

5-13RADIUS Authentication and AccountingConfiguring the Switch for RADIUS Authentication Note Where the switch has multiple RADIUS servers configured

Página 18 - Introduction

5-14RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFor example, suppose that your switch is configured to use thr

Página 19

5-15RADIUS Authentication and AccountingConfiguring the Switch for RADIUS AuthenticationFigure 5-6. Listings of Global RADIUS Parameters Configured In

Página 20

5-16RADIUS Authentication and AccountingLocal Authentication ProcessLocal Authentication ProcessWhen the switch is configured to use RADIUS, it revert

Página 21 - Conventions

5-17RADIUS Authentication and AccountingControlling Web Browser Interface Access When Using RADIUS AuthenticationControlling Web Browser Interface Acc

Página 22 - Port Identity Examples

5-18RADIUS Authentication and AccountingConfiguring RADIUS AccountingNote This section assumes you have already: Configured RADIUS authentication on

Página 23 - Sources for More Information

5-19RADIUS Authentication and AccountingConfiguring RADIUS AccountingThe switch forwards the accounting information it collects to the designated RADI

Página 24 - Need Only a Quick Start?

xBuilding IP Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9Configuring One Station Per Author

Página 25

5-20RADIUS Authentication and AccountingConfiguring RADIUS Accounting– Optional—if you are also configuring the switch for RADIUS authentication, and

Página 26

5-21RADIUS Authentication and AccountingConfiguring RADIUS Accounting(For a more complete description of the radius-server command and its options, tu

Página 27

5-22RADIUS Authentication and AccountingConfiguring RADIUS AccountingFigure 5-7. Example of Configuring for a RADIUS Server with a Non-Default Account

Página 28

5-23RADIUS Authentication and AccountingConfiguring RADIUS Accounting Start-Stop: • Send a start record accounting notice at the beginning of the acc

Página 29

5-24RADIUS Authentication and AccountingConfiguring RADIUS Accounting3. (Optional) Configure Session Blocking and Interim Updating OptionsThese option

Página 30 - Menu: Setting Passwords

5-25RADIUS Authentication and AccountingViewing RADIUS StatisticsViewing RADIUS StatisticsGeneral RADIUS StatisticsFigure 5-10. Example of General RAD

Página 31

5-26RADIUS Authentication and AccountingViewing RADIUS StatisticsFigure 5-11. RADIUS Server Information From the Show Radius Host Command

Página 32 - [?] in the web

5-27RADIUS Authentication and AccountingViewing RADIUS StatisticsTable 5-2. Values for Show Radius Host Output (Figure 5-11)Term DefinitionRound Trip

Página 33 - Front-Panel Security

5-28RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Authentication StatisticsFigure 5-12. Example of Login Attempt and Primary/Sec

Página 34 - Clear Button

5-29RADIUS Authentication and AccountingViewing RADIUS StatisticsRADIUS Accounting StatisticsFigure 5-14. Listing the Accounting Configuration in the

Página 35 - Reset Button

xiProduct DocumentationAbout Your Switch Manual SetThe switch manual set includes the following: Read Me First - a printed guide shipped with your sw

Página 36

5-30RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderFigure 5-16. Example Listing of Active RADIUS Accounting Sessions on the Sw

Página 37

5-31RADIUS Authentication and AccountingChanging RADIUS-Server Access OrderTo exchange the positions of the addresses so that the server at 10.10.10.0

Página 38

5-32RADIUS Authentication and AccountingMessages Related to RADIUS OperationMessages Related to RADIUS OperationMessage MeaningCan’t reach RADIUS serv

Página 39

6-16Configuring Secure Shell (SSH)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 40

6-2Configuring Secure Shell (SSH)OverviewOverviewThe ProCurve switches covered in this guide use Secure Shell version 1 or 2 (SSHv1 or SSHv2) to provi

Página 41 - Password Recovery

6-3Configuring Secure Shell (SSH)OverviewNote SSH in the ProCurve is based on the OpenSSH software toolkit. For more information on OpenSSH, visit www

Página 42 - [N] (for “No”)

6-4Configuring Secure Shell (SSH)TerminologyTerminology SSH Server: A ProCurve switch with SSH enabled. Key Pair: A pair of keys generated by the sw

Página 43 - Password Recovery Process

6-5Configuring Secure Shell (SSH)Prerequisite for Using SSHPrerequisite for Using SSHBefore using the switch as an SSH server, you must install a publ

Página 44

6-6Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationSteps for Configuring and Using SSHfor Switch

Página 45 - Web and MAC Authentication

6-7Configuring Secure Shell (SSH)Steps for Configuring and Using SSH for Switch and Client AuthenticationB. Switch Preparation1. Assign a login (Opera

Página 46

xiiProduct DocumentationFeature IndexFor the manual set supporting your switch model, the following feature index indicates which manual to consult fo

Página 47 - Client Options

6-8Configuring Secure Shell (SSH)General Operating Rules and NotesGeneral Operating Rules and Notes Public keys generated on an SSH client must be ex

Página 48 - General Features

6-9Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationConfiguring the Switch for SSH Operation1. Assign Local Login (Operator) and

Página 49 - Authenticator Operation

6-10Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-5. Example of Configuring Local Passwords2. Generate the Switch’s P

Página 50

6-11Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationNotes When you generate a host key pair on the switch, the switch places the

Página 51 - MAC-based Authentication

6-12Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFor example, to generate and display a new key:Figure 6-6. Example of Genera

Página 52

6-13Configuring Secure Shell (SSH)Configuring the Switch for SSH Operationdistribution to clients is to use a direct, serial connection between the sw

Página 53

6-14Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation4. Add any data required by your SSH client application. For example Before

Página 54 - Operating Rules and Notes

6-15Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-10. Examples of Visual Phonetic and Hexadecimal Conversions of the

Página 55

6-16Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationSSH Client Contact Behavior. At the first contact between the switch and an

Página 56

6-17Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationNote on Port NumberProCurve recommends using the default TCP port number (22

Página 57

xiiiProduct DocumentationLLDP X - -MAC Address Management X --Monitoring and Analysis X - -Multicast Filtering - X -Network Management Applications (L

Página 58 - Addresses

6-18Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationCaution Protect your private key file from access by anyone other than yours

Página 59 - RADIUS Server

6-19Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationOption B: Configuring the Switch for Client Public-Key SSH Authentication.

Página 60

6-20Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationWith steps 1 - 3, above, completed and SSH properly configured on the switch

Página 61

6-21Configuring Secure Shell (SSH)Configuring the Switch for SSH OperationFigure 6-12. Configuring for SSH Access Requiring a Client Public-Key Match

Página 62

6-22Configuring Secure Shell (SSH)Configuring the Switch for SSH Operation6. Use an SSH Client To Access the SwitchTest the SSH configuration on the s

Página 63

6-23Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFurther Information on SSH Client Public-Key Authenticati

Página 64

6-24Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key Authentication3. If there is not a match, and you have not configured t

Página 65

6-25Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationNotes Comments in public key files, such as smith@support

Página 66

6-26Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationCopying a client-public-key into the switch requires the

Página 67

6-27Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationFor example, if you wanted to copy a client public-key fi

Página 68

xivProduct DocumentationTelnet Access X - -TFTP X --Time Protocols (TimeP, SNTP) X - -Troubleshooting X --VLANs - X -Xmodem X --Feature Management and

Página 69

6-28Configuring Secure Shell (SSH)Further Information on SSH Client Public-Key AuthenticationCaution To enable client public-key authentication to blo

Página 70 - Web-Based Authentication

6-29Configuring Secure Shell (SSH)Messages Related to SSH OperationMessages Related to SSH OperationMessage Meaning00000K Peer unreachable.Indicates a

Página 71

6-30Configuring Secure Shell (SSH)Messages Related to SSH OperationGenerating new RSA host key. If the cache is depleted, this could take up to two m

Página 72 - MAC-Based Authentication

7-17Configuring Secure Socket Layer (SSL)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 73

7-2Configuring Secure Socket Layer (SSL)OverviewOverviewThe ProCurve switches covered by this manual use Secure Socket Layer Version 3 (SSLv3) and sup

Página 74 - Show Client Status

7-3Configuring Secure Socket Layer (SSL)TerminologyFigure 7-1. Switch/User AuthenticationSSL on the ProCurve switches supports these data encryption m

Página 75

7-4Configuring Secure Socket Layer (SSL)Terminology Self-Signed Certificate: A certificate not verified by a third-party certificate authority (CA).

Página 76

7-5Configuring Secure Socket Layer (SSL)Prerequisite for Using SSLPrerequisite for Using SSLBefore using the switch as an SSL server, you must install

Página 77 - Applications:

7-6Configuring Secure Socket Layer (SSL)General Operating Rules and NotesGeneral Operating Rules and Notes Once you generate a certificate on the swi

Página 78

7-7Configuring Secure Socket Layer (SSL)General Operating Rules and NotesConfiguring the Switch for SSL Operation1. Assign Local Login (Operator) and

Página 79 - General System Requirements

1-11Getting StartedContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Ov

Página 80

7-8Configuring Secure Socket Layer (SSL)General Operating Rules and NotesUsing the web browser interface To Configure Local Passwords. You can config

Página 81 - Privilege Levels

7-9Configuring Secure Socket Layer (SSL)General Operating Rules and Notesto connect via SSL to the switch. (The session key pair mentioned above is no

Página 82 - Before You Begin

7-10Configuring Secure Socket Layer (SSL)General Operating Rules and NotesCLI commands used to generate a Server Host Certificate. To generate a host

Página 83 - Configuration

7-11Configuring Secure Socket Layer (SSL)General Operating Rules and NotesTable 7-1. Certificate Field Descriptions For example, to generate a key and

Página 84 - Contact Configuration

7-12Configuring Secure Socket Layer (SSL)General Operating Rules and NotesCLI Command to view host certificates. To view the current host certificate

Página 85

7-13Configuring Secure Socket Layer (SSL)General Operating Rules and Notesi. Select the Security tab then the [SSL] button. The SSL configuration scre

Página 86

7-14Configuring Secure Socket Layer (SSL)General Operating Rules and NotesFor example, to generate a new host certificate via the web browsers inter-f

Página 87 - Login Primary

7-15Configuring Secure Socket Layer (SSL)General Operating Rules and NotesFigure 7-6. Web browser Interface showing current SSL Host CertificateGenera

Página 88

7-16Configuring Secure Socket Layer (SSL)General Operating Rules and Notesthat involves having the certificate authority verify the certificate reques

Página 89

7-17Configuring Secure Socket Layer (SSL)General Operating Rules and Notes Figure 7-7. Example of a Certificate Request and Reply3. Enable SSL on the

Página 90 - Encryption Keys

1-2Getting StartedIntroductionIntroductionThis Access Security Guide describes how to use ProCurve’s switch security features to protect access to you

Página 91

7-18Configuring Secure Socket Layer (SSL)General Operating Rules and NotesNote Before enabling SSL on the switch you must generate the switch’s host c

Página 92 - First-Choice TACACS+ Server

7-19Configuring Secure Socket Layer (SSL)General Operating Rules and NotesUsing the CLI interface to enable SSLTo enable SSL on the switch1. Generate

Página 93

7-20Configuring Secure Socket Layer (SSL)General Operating Rules and NotesFigure 7-8. Using the web browser interface to enable SSL and select TCP por

Página 94 - How Authentication Operates

7-21Configuring Secure Socket Layer (SSL)Common Errors in SSL SetupCommon Errors in SSL SetupError During Possible CauseGenerating host certificate on

Página 95

7-22Configuring Secure Socket Layer (SSL)Common Errors in SSL Setup

Página 96

8-18Configuring Port-Based and Client-Based Access Control (802.1X)ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 97 - Using the Encryption Key

8-2Configuring Port-Based and Client-Based Access Control (802.1X)ContentsSetting Up and Configuring 802.1X Open VLAN Mode . . . . . . . . . . . . 8-

Página 98 - Access When Using TACACS+

8-3Configuring Port-Based and Client-Based Access Control (802.1X)OverviewOverviewWhy Use Port-Based or Client-Based Access Control?Local Area Network

Página 99 - Messages Related to TACACS+

8-4Configuring Port-Based and Client-Based Access Control (802.1X)OverviewPort-Based access control option allowing authentication by a single client

Página 100 - TACACS+ Authentication

8-5Configuring Port-Based and Client-Based Access Control (802.1X)Overview802.1X Port-Based Access Control802.1X port-based access control provides po

Página 101 - Contents

1-3Getting StartedOverview of Access Security Features Port-Based Access Control (802.1X) (page 8-1): On point-to-point connections, enables the swit

Página 102 - Overview

8-6Configuring Port-Based and Client-Based Access Control (802.1X)Overviewaccess from a master database in a single server (although you can use up to

Página 103 - Terminology

8-7Configuring Port-Based and Client-Based Access Control (802.1X)TerminologyTerminology802.1X-Aware: Refers to a device that is running either 802.1X

Página 104

8-8Configuring Port-Based and Client-Based Access Control (802.1X)TerminologyEAPOL: Extensible Authentication Protocol Over LAN, as defined in the 802

Página 105

8-9Configuring Port-Based and Client-Based Access Control (802.1X)Terminologydesignate as the Unauthorized-Client VLAN.) A port configured to use a gi

Página 106 - Authentication

8-10Configuring Port-Based and Client-Based Access Control (802.1X)General 802.1X Authenticator OperationGeneral 802.1X Authenticator OperationThis op

Página 107

8-11Configuring Port-Based and Client-Based Access Control (802.1X)General 802.1X Authenticator Operationii. If the client is successfully authenticat

Página 108 - You Want RADIUS To Protect

8-12Configuring Port-Based and Client-Based Access Control (802.1X)General Operating Rules and Notes3. Port A1 replies with an MD5 hash response based

Página 109 - SSH authentication

8-13Configuring Port-Based and Client-Based Access Control (802.1X)General Operating Rules and Notesport. If another client uses an 802.1X supplicant

Página 110

8-14Configuring Port-Based and Client-Based Access Control (802.1X)General Setup Procedure for 802.1X Access ControlGeneral Setup Procedure for 802.1X

Página 111

8-15Configuring Port-Based and Client-Based Access Control (802.1X)General Setup Procedure for 802.1X Access ControlOverview: Configuring 802.1X Authe

Página 113

1-4Getting StartedOverview of Access Security FeaturesTable 1-1. Management Access Security ProtectionGeneral Switch Traffic Security GuidelinesWhere

Página 114

8-16Configuring Port-Based and Client-Based Access Control (802.1X)General Setup Procedure for 802.1X Access Control7. If you are using Port Security

Página 115

8-17Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsConfiguring Switch Ports as 802.1X

Página 116 - Local Authentication Process

8-18Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsA. Enable the Selected Ports as Au

Página 117 - Configuring RADIUS Accounting

8-19Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X AuthenticatorsPort-Based 802.1X Authentication.

Página 118

8-20Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators2. Reconfigure Settings for Port-A

Página 119

8-21Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators[quiet-period < 0 - 65535 >]

Página 120

8-22Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators[reauth-period < 0 - 9999999 &g

Página 121

8-23Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators3. Configure the 802.1X Authentica

Página 122 - Reports to the RADIUS Server

8-24Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators4. Enter the RADIUS Host IP Addres

Página 123

8-25Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports as 802.1X Authenticators6. Optionally Resetting Authentica

Página 124 - Updating Options

1-5Getting StartedConventionsConventionsThis guide uses the following conventions for command syntax and displayed information.Command Syntax Statemen

Página 125 - Viewing RADIUS Statistics

8-26Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN Mode802.1X Open VLAN ModeIntroductionThis section describes how to

Página 126

8-27Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote On ports configured to allow multiple sessions using 802.

Página 127

8-28Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote After client authentication, the port resumes membership

Página 128

8-29Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeTable 8-1. 802.1X Open VLAN Mode Options802.1X Per-Port Config

Página 129 - RADIUS Accounting Statistics

8-30Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeOpen VLAN Mode with Only an Unauthorized-Client VLAN Configure

Página 130

8-31Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeOperating Rules for Authorized-Client andUnauthorized-Client V

Página 131

8-32Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeTemporary VLAN Membership During a Client Session• Port member

Página 132 - as both the

8-33Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeIP Addressing for a Client Connected to a Port Configured for

Página 133

8-34Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote If you use the same VLAN as the Unauthorized-Client VLAN

Página 134

8-35Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN Mode A client must either have a valid IP address configured befo

Página 135 - www.openssh.com

1-6Getting StartedConventionsCommand PromptsIn the default configuration, your switch displays the following CLI prompt:ProCurve Switch 2510-24#To sim

Página 136

8-36Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN Mode2. Configure the 802.1X authentication type. Options include:3

Página 137 - Public Key Formats

8-37Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeNote If you want to implement the optional port security featu

Página 138

8-38Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeInspecting 802.1X Open VLAN Mode Operation. For information a

Página 139

8-39Configuring Port-Based and Client-Based Access Control (802.1X)802.1X Open VLAN ModeRADIUS-assigned VLAN, then an authenticated client without tag

Página 140

8-40Configuring Port-Based and Client-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Device

Página 141 - Operation

8-41Configuring Port-Based and Client-Based Access Control (802.1X)Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Device

Página 142

8-42Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Página 143

8-43Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Página 144 - Key for the

8-44Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Página 145 - Modulus <n>

8-45Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Página 146

1-7Getting StartedSources for More InformationSources for More InformationFor additional information about switch operation and features not covered i

Página 147 - Client Contact Behavior

8-46Configuring Port-Based and Client-Based Access Control (802.1X)Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other

Página 148 - ■ Execute no ip ssh

8-47Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersDisplaying 802.1X Configur

Página 149

8-48Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Countersshow port-access authentic

Página 150

8-49Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 8-7. Example of sho

Página 151

8-50Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersViewing 802.1X Open VLAN M

Página 152

8-51Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and Counters When the Unauth VLAN ID

Página 153

8-52Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersFigure 8-9. Example of Sho

Página 154

8-53Configuring Port-Based and Client-Based Access Control (802.1X)Displaying 802.1X Configuration, Statistics, and CountersShow Commands for Port-Acc

Página 155 - Public-Key Authentication

8-54Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN Operationsupplicant port to another w

Página 156 - Bit Size Exponent <e>

8-55Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFor example, suppose that a

Página 157

1-8Getting StartedNeed Only a Quick Start? For information on a specific command in the CLI, type the command name followed by “help”. For example:Fi

Página 158 - Note on Public

8-56Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationFigure 8-11. The Active Conf

Página 159 - Key Index Number

8-57Configuring Port-Based and Client-Based Access Control (802.1X)How RADIUS/802.1X Authentication Affects VLAN OperationWhen the 802.1X client’s ses

Página 160

8-58Configuring Port-Based and Client-Based Access Control (802.1X)Messages Related to 802.1X OperationMessages Related to 802.1X OperationTable 8-4.

Página 161

9-19Configuring and Monitoring Port SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 162 - Message Meaning

9-2Configuring and Monitoring Port SecurityOverviewOverviewNote Port security is not available on ports running at 10 Mbps or the 1000 Mbps uplinks. I

Página 163

9-3Configuring and Monitoring Port SecurityOverviewGeneral Operation for Port Security. On a per-port basis, you can configure security measures to bl

Página 164

9-4Configuring and Monitoring Port SecurityOverviewFigure 9-1. Example of How Port Security Controls AccessNote Broadcast and Multicast traffic is not

Página 165

9-5Configuring and Monitoring Port SecurityPlanning Port SecurityPlanning Port Security1. Plan your port security configuration and monitoring accordi

Página 166

9-6Configuring and Monitoring Port SecurityPort Security Command Options and OperationPort Security Command Options and OperationPort Security Command

Página 167 - Prerequisite for Using SSL

9-7Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list >learn-mode < con

Página 168

1-9Getting StartedNeed Only a Quick Start?To Set Up and Install the Switch in Your NetworkImportant! Use the Installation and Getting Started Guide sh

Página 169 - Password

9-8Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list > (- Continued -)lea

Página 170 - Password Button

9-9Configuring and Monitoring Port SecurityPort Security Command Options and OperationSyntax: port-security [e] < port-list > (- Continued -)act

Página 171

9-10Configuring and Monitoring Port SecurityPort Security Command Options and OperationRetention of Static MAC AddressesLearned MAC AddressesIn the fo

Página 172

9-11Configuring and Monitoring Port SecurityPort Security Command Options and OperationUsing the CLI To Display Port Security Settings. Syntax:show po

Página 173 - Generate New Certificate

9-12Configuring and Monitoring Port SecurityPort Security Command Options and OperationThe following command example shows the option for entering a r

Página 174 - Show host certificate command

9-13Configuring and Monitoring Port SecurityPort Security Command Options and OperationProCurve(config)# port-security a1 learn-mode static mac-addres

Página 175

9-14Configuring and Monitoring Port SecurityPort Security Command Options and Operationmined by the current address-limit value). For example, suppose

Página 176 - [SSL] button

9-15Configuring and Monitoring Port SecurityPort Security Command Options and OperationNote The message Inconsistent value appears if the new MAC addr

Página 177 - Browser Interface

9-16Configuring and Monitoring Port SecurityPort Security Command Options and OperationCaution The address-limit setting controls how many MAC address

Página 178

9-17Configuring and Monitoring Port SecurityWeb: Displaying and Configuring Port Security FeaturesThe following command serves this purpose by removin

Página 179 - Browser Contact Behavior

1-10Getting StartedNeed Only a Quick Start?

Página 180

9-18Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsWhen a security violation occurs on a port configured fo

Página 181

9-19Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert Flags(by resetting the alert flag). The other entries give yo

Página 182 - Note on Port

9-20Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsMenu: Checking for Intrusions, Listing Intrusion Alerts,

Página 183 - Common Errors in SSL Setup

9-21Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsThe above example shows two intrusions for port A3 and o

Página 184

9-22Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsCLI: Checking for Intrusions, Listing Intrusion Alerts,

Página 185 - Access Control (802.1X)

9-23Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsFigure 9-12. Example of the Intrusion Log with Multiple

Página 186

9-24Configuring and Monitoring Port SecurityReading Intrusion Alerts and Resetting Alert FlagsUsing the Event Log To Find Intrusion AlertsThe Event Lo

Página 187

9-25Configuring and Monitoring Port SecurityOperating Notes for Port SecurityWeb: Checking for Intrusions, Listing Intrusion Alerts,and Resetting Aler

Página 188 - User Authentication Methods

9-26Configuring and Monitoring Port SecurityOperating Notes for Port Securitythe alert flag status for the port referenced in the dropped entry. This

Página 189

9-27Configuring and Monitoring Port SecurityConfiguring Protected PortsConfiguring Protected PortsThere are situations where you want to provide inter

Página 190

2-12Configuring Username and Password SecurityContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 191

9-28Configuring and Monitoring Port SecurityConfiguring Protected PortsFigure 9-16. Example Showing Protected Ports and Unprotected PortsIf you displa

Página 192 - 802.1X standard

10-110Using Authorized IP Managers ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 193

10-2Using Authorized IP ManagersOverviewOverviewAuthorized IP Manager Features The Authorized IP Managers feature uses IP addresses and masks to deter

Página 194

10-3Using Authorized IP ManagersAccess LevelsConfiguration OptionsYou can configure: Up to 10 authorized manager addresses, where each address applie

Página 195

10-4Using Authorized IP ManagersDefining Authorized Management StationsDefining Authorized Management Stations Authorizing Single Stations: The table

Página 196

10-5Using Authorized IP ManagersDefining Authorized Management Stations255.255.255.252 uses the 4th octet of a given Authorized Manager IP address to

Página 197 - Note on 802.1X

10-6Using Authorized IP ManagersDefining Authorized Management StationsFigure 10-2. Example of How To Add an Authorized Manager Entry (Continued)Editi

Página 198 - Access Control

10-7Using Authorized IP ManagersDefining Authorized Management StationsFigure 10-3. Example of the Show IP Authorized-Manager DisplayThe above example

Página 199

10-8Using Authorized IP ManagersDefining Authorized Management StationsSimilarly, the next command authorizes manager-level access for any station hav

Página 200

10-9Using Authorized IP ManagersWeb: Configuring IP Authorized ManagersWeb: Configuring IP Authorized ManagersIn the web browser interface you can con

Página 201 - Authenticators

2-2Configuring Username and Password SecurityOverviewOverviewConsole access includes both the menu interface and the CLI. There are two levels of cons

Página 202

10-10Using Authorized IP ManagersBuilding IP MasksTable 10-1. Analysis of IP Mask for Single-Station EntriesConfiguring Multiple Stations Per Authoriz

Página 203

10-11Using Authorized IP ManagersBuilding IP MasksTable 10-2. Analysis of IP Mask for Multiple-Station Entries Figure 10-5. Example of How the Bitmap

Página 204

10-12Using Authorized IP ManagersOperating NotesAdditional Examples for Authorizing Multiple StationsOperating Notes Network Security Precautions: Yo

Página 205

10-13Using Authorized IP ManagersOperating Notes• Even if you need proxy server access enabled in order to use other applications, you can still elimi

Página 206

10-14Using Authorized IP ManagersOperating Notes

Página 207

Index – 1IndexNumerics3DES … 6-3, 7-3802.1XSee port-based access control. …8-1802.1X access controlauthentication methods … 8-4authentication, client-

Página 208

2 – IndexVLAN use, multiple clients … 8-7Aaaa authentication … 4-8aaa port-accessSee Web or MAC Authentication.access levels, authorized IP managers …

Página 209

Index – 3MMAC Authenticationauthenticator operation … 3-5blocked traffic … 3-4CHAPdefined … 3-9usage … 3-4client status … 3-30configuration commands …

Página 210 - 802.1X Open VLAN Mode

4 – IndexLACP not allowed … 8-58local … 8-23local username and password … 8-4messages … 8-58open VLANauthorized client … 8-28configuration … 8-35, 8-3

Página 211 - VLAN Membership Priorities

Index – 5SNMP access security not supported … 5-2statistics, viewing … 5-25terminology … 5-3TLS … 5-4Web browser authentication … 5-7web-browser acces

Página 212

2-3Configuring Username and Password SecurityOverviewTo configure password security:1. Set a Manager password pair (and an Operator password pair, if

Página 213

6 – Indexprerequisites … 7-5remove self-signed certificate … 7-9remove server host certificate … 7-9reserved TCP port numbers … 7-20root … 7-4root cer

Página 214

Index – 7client status … 3-30configuration commands … 3-18configuringon the switch … 3-17switch for RADIUS access … 3-15features … 3-4general setup …

Página 217

Technical information in this document is subject to change without notice.© Copyright 2008 Hewlett-Packard Development Company, L.P. All rights reser

Página 218

ProCurve Series 2510 SwitchesAccess Security GuideJanuary 2008

Página 219

2-4Configuring Username and Password SecurityConfiguring Local Password SecurityConfiguring Local Password SecurityMenu: Setting PasswordsAs noted ear

Página 220

2-5Configuring Username and Password SecurityConfiguring Local Password SecurityIf you have physical access to the switch, press and hold the Clear bu

Página 221

2-6Configuring Username and Password SecurityConfiguring Local Password SecurityTo Remove Password Protection. Removing password protection means to

Página 222

2-7Configuring Username and Password SecurityFront-Panel SecurityFront-Panel SecurityThe front-panel security features provide the ability to independ

Página 223

2-8Configuring Username and Password SecurityFront-Panel SecurityAs a result of increased security concerns, customers now have the ability to stop so

Página 224 - Only 802.1X Devices

2-9Configuring Username and Password SecurityFront-Panel SecurityReset ButtonPressing the Reset button alone for one second causes the switch to reboo

Página 225 - 802.1X Device

2-10Configuring Username and Password SecurityFront-Panel Security3. Release the Reset button and wait for about one second for the Self-Test LED to s

Página 226 - Other Switches

2-11Configuring Username and Password SecurityFront-Panel Security• Modify the operation of the Reset+Clear combination (page 2-9) so that the switch

Página 227

2-12Configuring Username and Password SecurityFront-Panel SecurityFor example, show front-panel-security produces the following output when the switch

Página 228 - Supplicant Port Configuration

2-13Configuring Username and Password SecurityFront-Panel SecurityRe-Enabling the Clear Button on the Switch’s Front Panel andSetting or Changing the

Página 229

Hewlett-Packard Company8000 Foothills Boulevard, m/s 5551Roseville, California 95747-5551http://www.procurve.com© Copyright 2008 Hewlett-Packard Compa

Página 230

2-14Configuring Username and Password SecurityFront-Panel SecurityFigure 2-9. Example of Re-Enabling the Clear Button’s Default OperationChanging the

Página 231 - Statistics, and Counters

2-15Configuring Username and Password SecurityFront-Panel SecurityFigure 2-10. Example of Disabling the Factory Reset OptionPassword RecoveryThe passw

Página 232 - ■ Auth-VLAN ID (if any)

2-16Configuring Username and Password SecurityFront-Panel SecuritySteps for Disabling Password-Recovery. 1. Set the CLI to the global interface conte

Página 233

2-17Configuring Username and Password SecurityFront-Panel SecurityFigure 2-11. Example of the Steps for Disabling Password-RecoveryPassword Recovery P

Página 234

2-18Configuring Username and Password SecurityFront-Panel SecurityNote The alternate password provided by the ProCurve Customer Care Center is valid o

Página 235

3-13Web and MAC AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 236

3-2Web and MAC AuthenticationOverviewOverviewWeb and MAC Authentication are designed for employment on the “edge” of a network to provide port-based s

Página 237 - ■ The switch reboots

3-3Web and MAC AuthenticationOverviewpassword, and grants or denies network access in the same way that it does for clients capable of interactive log

Página 238

3-4Web and MAC AuthenticationOverviewGeneral FeaturesWeb and MAC Authentication includes the following: On a port configured for Web or MAC Authentic

Página 239

3-5Web and MAC AuthenticationHow Web and MAC Authentication OperateHow Web and MAC Authentication OperateAuthenticator OperationBefore gaining access

Página 240

iiiContentsProduct DocumentationAbout Your Switch Manual Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiFeature Index

Página 241 - After the 802.1X session

3-6Web and MAC AuthenticationHow Web and MAC Authentication OperateFigure 3-2. Progress Message During AuthenticationIf the client is authenticated an

Página 242

3-7Web and MAC AuthenticationHow Web and MAC Authentication Operatemoves have not been enabled (client-moves) on the ports, the session ends and the c

Página 243

3-8Web and MAC AuthenticationHow Web and MAC Authentication Operate4. If neither 1, 2, or 3, above, apply, then the client session does not have acces

Página 244

3-9Web and MAC AuthenticationTerminologyTerminologyAuthorized-Client VLAN: Like the Unauthorized-Client VLAN, this is a conventional, static, untagged

Página 245 - Blocking Unauthorized Traffic

3-10Web and MAC AuthenticationOperating Rules and NotesOperating Rules and Notes You can configure one type of authentication on a port. That is, the

Página 246 - Trunk Group Exclusion

3-11Web and MAC AuthenticationOperating Rules and Notes2. If there is no RADIUS-assigned VLAN, then, for the duration of the client session, the port

Página 247 - Planning Port Security

3-12Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC AuthenticationNote on Web/MAC Authentication and LACPThe switch does not allow Web o

Página 248

3-13Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC Authenticationc. If there is neither a RADIUS-assigned VLAN or an “Authorized VLAN”

Página 249

3-14Web and MAC AuthenticationGeneral Setup Procedure for Web/MAC AuthenticationAdditional Information for Configuring the RADIUSServer To Support MAC

Página 250

3-15Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS ServerConfiguring the Switch To Access a RADIUS ServerThis section describes t

Página 251

ivFront-Panel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7When Security Is Important . . .

Página 252 - Learned MAC Addresses

3-16Web and MAC AuthenticationConfiguring the Switch To Access a RADIUS ServerFor example, to configure the switch to access a RADIUS server at IP add

Página 253

3-17Web and MAC AuthenticationConfiguring Web AuthenticationConfiguring Web AuthenticationOverview1. If you have not already done so, configure a loca

Página 254 - Configuring Port Security

3-18Web and MAC AuthenticationConfiguring Web AuthenticationConfigure the Switch for Web-Based AuthenticationCommand PageConfiguration Levelaaa port-a

Página 255

3-19Web and MAC AuthenticationConfiguring Web AuthenticationSyntax: [no] aaa port-access web-based [e] < port-list>Enables web-based authenticat

Página 256

3-20Web and MAC AuthenticationConfiguring Web AuthenticationSyntax:aaa port-access web-based [e] < port-list > [logoff-period] <60-9999999>

Página 257

3-21Web and MAC AuthenticationConfiguring Web AuthenticationSyntax: aaa port-access web-based [e] < port-list > [redirect-url <url>]no aaa

Página 258

3-22Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchConfiguring MAC Authentication on the SwitchOverview1. If you have not alrea

Página 259 - Alert Flags

3-23Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchConfigure the Switch for MAC-Based AuthenticationCommand PageConfiguration L

Página 260

3-24Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-based [e] < port-list > [addr-limit <1-

Página 261 - Send-Disable

3-25Web and MAC AuthenticationConfiguring MAC Authentication on the SwitchSyntax: aaa port-access mac-based [e] < port-list > [quiet-period <

Página 262 - Resetting Alert Flags

v4 TACACS+ AuthenticationContents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1Ov

Página 263

3-26Web and MAC AuthenticationShow Status and Configuration of Web-Based AuthenticationShow Status and Configuration of Web-Based AuthenticationComman

Página 264

3-27Web and MAC AuthenticationShow Status and Configuration of Web-Based AuthenticationSyntax: show port-access [port-list] web-based [config [auth-se

Página 265

3-28Web and MAC AuthenticationShow Status and Configuration of MAC-Based AuthenticationShow Status and Configuration of MAC-Based AuthenticationComman

Página 266

3-29Web and MAC AuthenticationShow Status and Configuration of MAC-Based AuthenticationSyntax: show port-access [port-list] mac-based [config [auth-se

Página 267

3-30Web and MAC AuthenticationShow Client StatusShow Client StatusThe table below shows the possible client status information that may be reported by

Página 268

4-14TACACS+ AuthenticationContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 269 - Configuring Protected Ports

4-2TACACS+ AuthenticationConfiguring TACACS+ on the SwitchOverviewTACACS+ authentication enables you to use a central server to allow or deny access t

Página 270

4-3TACACS+ AuthenticationConfiguring TACACS+ on the Switchtion services. If the switch fails to connect to any TACACS+ server, it defaults to its own

Página 271 - Using Authorized IP Managers

4-4TACACS+ AuthenticationConfiguring TACACS+ on the Switch• Local Authentication: This method uses username/password pairs configured locally on the s

Página 272

4-5TACACS+ AuthenticationConfiguring TACACS+ on the SwitchGeneral System RequirementsTo use TACACS+ authentication, you need the following: A TACACS+

Página 273 - Access Levels

viConfiguring the Switch for RADIUS Authentication . . . . . . . . . . . . . . . . . . 5-6Outline of the Steps for Configuring RADIUS Authentication

Página 274 - Stations

4-6TACACS+ AuthenticationConfiguring TACACS+ on the Switchother access type (console, in this case) open in case the Telnet access fails due to a conf

Página 275 - Managers

4-7TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Privilege LevelsWhen a TACACS+ server authenticates an access request from a switch,

Página 276

4-8TACACS+ AuthenticationConfiguring TACACS+ on the Switchconfiguration in your TACACS+ server application for mis-configura-tions or missing data tha

Página 277

4-9TACACS+ AuthenticationConfiguring TACACS+ on the SwitchCLI Commands Described in this SectionViewing the Switch’s Current Authentication Configurat

Página 278

4-10TACACS+ AuthenticationConfiguring TACACS+ on the SwitchViewing the Switch’s Current TACACS+ ServerContact ConfigurationThis command lists the time

Página 279 - Building IP Masks

4-11TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s Authentication MethodsThe aaa authentication command configures th

Página 280 - IP Entry

4-12TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-1. AAA Authentication ParametersAs shown in the next table, login and enable access

Página 281

4-13TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-2. Primary/Secondary Authentication TableCaution Regarding the Use of Local for Log

Página 282 - Operating Notes

4-14TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, here is a set of access options and the corresponding commands to configure th

Página 283

4-15TACACS+ AuthenticationConfiguring TACACS+ on the SwitchConfiguring the Switch’s TACACS+ Server AccessThe tacacs-server command configures these pa

Página 284

vii4. Enable SSH on the Switch and Anticipate SSHClient Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-

Página 285 - See also port based

4-16TACACS+ AuthenticationConfiguring TACACS+ on the SwitchNote on Encryption KeysEncryption keys configured in the switch must exactly match the encr

Página 286 - 2 – Index

4-17TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTable 4-3. Details on Configuring TACACS Servers and KeysName Default Rangetacacs-server

Página 287 - Index – 3

4-18TACACS+ AuthenticationConfiguring TACACS+ on the SwitchAdding, Removing, or Changing the Priority of a TACACS+ Server. Suppose that the switch was

Página 288 - 4 – Index

4-19TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFigure 4-5. Example of the Switch After Assigning a Different “First-Choice” ServerTo remov

Página 289 - Index – 5

4-20TACACS+ AuthenticationConfiguring TACACS+ on the SwitchTo delete a per-server encryption key in the switch, re-enter the tacacs-server host comman

Página 290 - 6 – Index

4-21TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFigure 4-6. Using a TACACS+ Server for AuthenticationUsing figure 4-6, above, after either

Página 291 - Index – 7

4-22TACACS+ AuthenticationConfiguring TACACS+ on the SwitchLocal Authentication ProcessWhen the switch is configured to use TACACS+, it reverts to loc

Página 292 - 8 – Index

4-23TACACS+ AuthenticationConfiguring TACACS+ on the SwitchUsing the Encryption KeyGeneral OperationWhen used, the encryption key (sometimes termed “k

Página 293

4-24TACACS+ AuthenticationConfiguring TACACS+ on the SwitchFor example, you would use the next command to configure a global encryp-tion key in the sw

Página 294

4-25TACACS+ AuthenticationConfiguring TACACS+ on the SwitchMessages Related to TACACS+ OperationThe switch generates the CLI messages listed below. Ho

Comentários a estes Manuais

Sem comentários