EasyManua.ls Logo

HP 5120 EI Switch Series User Manual

HP 5120 EI Switch Series
304 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #32 background imageLoading...
Page #32 background image
22
NOTE:
If both the primary and secondary authentication/authorization servers are specified, the secondary one is used
when the primary one is not reachable.
If redundancy is not required, specify only the primary RADIUS authentication/authorization server.
In practice, you may specify one RADIUS server as the primary authentication/authorization server, and up to
16 RADIUS servers as the secondary authentication/authorization servers, or specify a server as the primary
authentication/authorization server for a scheme and as the secondary authentication/authorization servers for
another scheme at the same time.
The IP addresses of the primary and secondary authentication/authorization servers for a scheme must be
different from each other. Otherwise, the configuration will fail.
All servers for authentication/authorization and accountings, primary or secondary, must use IP addresses of the
same IP version.
Specifying the RADIUS accounting servers and relevant parameters
You can specify one primary accounting server and up to 16 secondary accounting servers for a RADIUS
scheme. When the primary server is not available, a secondary server is used, if any. When redundancy
is not required, specify only the primary server.
By setting the maximum number of real-time accounting attempts for a scheme, you make the device
disconnect users for whom no accounting response is received before the number of accounting attempts
reaches the limit.
When the device receives a connection teardown request from a host or a connection teardown
notification from an administrator, it sends a stop-accounting request to the accounting server. You can
enable buffering of non-responded stop-accounting requests to allow the device to buffer and resend a
stop-accounting request until it receives a response or the number of stop-accounting attempts reaches the
configured limit. In the latter case, the device discards the packet.
Follow these steps to specify the RADIUS accounting servers and perform related configurations:
To do…
Use the command…
Remarks
Enter system view
system-view
Enter RADIUS scheme view
radius scheme radius-scheme-name
Specify the primary RADIUS
accounting server
primary accounting { ip-address [ port-number
| key string ] * | ipv6 ipv6-address [ port-
number | key string ] * }
Required
Configure at least one
command.
No accounting server is
specified by default.
Specify the secondary RADIUS
accounting server
secondary accounting { ip-address [ port-
number | key string ] * | ipv6 ipv6-address [
port-number | key string ] * }
Enable the device to buffer
stop-accounting requests to
which no responses are
received
stop-accounting-buffer enable
Optional
Enabled by default
Set the maximum number of
stop-accounting attempts
retry stop-accounting retry-times
Optional
500 by default
Set the maximum number of
real-time accounting attempts
retry realtime-accounting retry-times
Optional
5 by default

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP 5120 EI Switch Series and is the answer not in the manual?

HP 5120 EI Switch Series Specifications

General IconGeneral
ModelHP 5120 EI Switch Series
LayerLayer 3
Forwarding Rate96 Mpps
MAC Address Table Size16K
Power SupplyInternal
ManagementCLI, Web GUI, SNMP
FeaturesIPv6 support
Routing ProtocolRIP, OSPF, BGP
Security FeaturesACLs
Layer 3 FeaturesOSPF, BGP, VRRP
RedundancyVRRP
Operating Temperature0°C to 45°C
SFP Slots4
VLAN Support4094
Jumbo Frames9216 bytes

Summary

AAA Configuration

AAA Configuration Considerations and Task List

Outlines the tasks and considerations required for configuring AAA on a NAS device.

Configuring AAA Schemes

Details the process of configuring AAA schemes, including local, RADIUS, and HWTACACS schemes.

Configuring RADIUS and HWTACACS Schemes

Describes configuring RADIUS and HWTACACS schemes, specifying servers, shared keys, and parameters.

Configuring AAA Authentication, Authorization, and Accounting Methods

Details the configuration of authentication, authorization, and accounting methods for users within an ISP domain.

802.1X Configuration

Configuring 802.1X

Provides steps for enabling 802.1X, setting access control, and configuring guest/Auth-Fail VLANs.

Enabling 802.1X and Access Control

Details enabling 802.1X globally and on ports, along with specifying access control methods.

MAC Authentication Configuration

MAC Authentication Configuration Task List

Lists tasks for configuring MAC authentication, including basic setup and examples.

Basic Configuration for MAC Authentication

Covers the basic steps for configuring MAC authentication globally and on ports.

Portal Configuration

Configuring Layer 2 Portal Authentication

Details the steps to configure Layer 2 portal authentication, including VLAN assignment and Auth-Fail VLAN.

Triple Authentication Configuration

Configuring Triple Authentication

Provides steps to configure triple authentication by enabling portal, MAC, and 802.1X authentication.

Port Security Configuration

Enabling Port Security and Setting Mode

Provides steps to enable port security and set its mode, like autoLearn or secure.

User Profile Configuration

Creating and Enabling User Profiles

Details creating and enabling user profiles to apply configurations and restrict user behaviors.

Password Control Configuration

Password Control Configuration Task List

Lists tasks for configuring password control, including global, group, and local user settings.

Configuring Password Control

Details enabling password control features like aging, history, and complexity checking.

Public Key Configuration

Configuring the Local Asymmetric Key Pair

Details creating, destroying, displaying, and exporting local RSA or DSA key pairs.

PKI Configuration

PKI Configuration Task List

Lists tasks for configuring PKI, including entity DN, PKI domain, and certificate requests.

Configuring an Entity DN and PKI Domain

Details configuring entity DN parameters and PKI domains for certificate requests.

Submitting and Retrieving Certificates

Explains submitting certificate requests in auto/manual modes and retrieving certificates.

SSH2.0 Configuration

Configuring the Device as an SSH Server

Provides steps to configure the device as an SSH server, including key generation and user setup.

SSH Server Configuration Task List

Lists tasks for configuring the SSH server, such as key pair generation and enabling the server.

Configuring the Device as an SSH Client

Details configuring the device as an SSH client, including source IP and connection setup.

SFTP Configuration

Configuring the Device as an SFTP Server

Provides steps to enable and configure the device as an SFTP server.

Configuring the Device an SFTP Client

Details configuring the device as an SFTP client, including source IP and connection setup.

SSL Configuration

Configuring an SSL Server Policy

Details setting SSL parameters for a server, including PKI domain and cipher suites.

TCP Attack Protection Configuration

IP Source Guard Configuration

ARP Attack Protection Configuration

ND Attack Defense Configuration

Related product manuals