EasyManuals Logo
Home>HP>Switch>A5830 Series

HP A5830 Series User Manual

HP A5830 Series
280 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #5 background imageLoading...
Page #5 background image
v
Configuring port security ········································································································································ 107
Port security features ··········································································································································· 107
Port security modes ············································································································································· 107
Support for guest VLAN and Auth-Fail VLAN ··································································································· 110
Port security configuration task list ····························································································································· 110
Enabling port security ·················································································································································· 111
Configuration prerequisites ································································································································ 111
Configuration procedure ···································································································································· 111
Setting port security’s limit on the number of MAC addresses on a port ······························································ 111
Setting the port security mode ···································································································································· 112
Configuration prerequisites ································································································································ 112
Configuration procedure ···································································································································· 112
Configuring port security features ······························································································································ 113
Configuring NTK ················································································································································· 113
Configuring intrusion protection ························································································································ 113
Enabling port security traps ································································································································ 114
Configuring secure MAC addresses ·························································································································· 114
Configuration prerequisites ································································································································ 115
Configuration procedure ···································································································································· 115
Ignoring authorization information from the server ·································································································· 115
Displaying and maintaining port security ·················································································································· 116
Port security configuration examples ························································································································· 116
Configuring the autoLearn mode ······················································································································· 116
Configuring the userLoginWithOUI mode ········································································································ 119
Configuring the macAddressElseUserLoginSecure mode ················································································ 123
Troubleshooting port security ······································································································································ 126
Cannot set the port security mode ····················································································································· 126
Cannot configure secure MAC addresses ········································································································ 126
Cannot change port security mode when a user is online ············································································· 126
Configuring password control ································································································································ 128
Password control configuration task list ····················································································································· 130
Enabling password control ································································································································· 131
Setting global password control parameters ···································································································· 131
Setting user group password control parameters ···························································································· 132
Setting local user password control parameters ······························································································ 133
Setting super password control parameters ····································································································· 133
Setting a local user password in interactive mode ·························································································· 134
Displaying and maintaining password control ········································································································· 134
Password control configuration example ·················································································································· 135
Configuring public keys ·········································································································································· 138
Public key configuration task list ································································································································ 138
Configuring a local asymmetric key pair on the local device················································································· 139
Creating a local asymmetric key pair ··············································································································· 139
Displaying or exporting the local host public key ··························································································· 139
Destroying a local asymmetric key pair ············································································································ 141
Specifying the peer public key on the local device ································································································· 141
Displaying and maintaining public keys ··················································································································· 142
Public key configuration examples ····························································································································· 142
Manually specifying the peer public key on the local device ········································································ 142
Importing a public key from a public key file ·································································································· 144
Configuring PKI ······················································································································································· 147
PKI terms ······························································································································································· 147
PKI architecture ···················································································································································· 148
PKI applications ··················································································································································· 149

Table of Contents

Other manuals for HP A5830 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP A5830 Series and is the answer not in the manual?

HP A5830 Series Specifications

General IconGeneral
BrandHP
ModelA5830 Series
CategorySwitch
LanguageEnglish

Related product manuals