EasyManua.ls Logo

HP ProCurve 2510G Series User Manual

HP ProCurve 2510G Series
320 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #219 background image
8-21
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
[quiet-period < 0 - 65535 >]
Sets the period during which the port does not try to
acquire a supplicant. The period begins after the last
attempt authorized by the max-requests parameter fails
(next page). (Default: 60 seconds)
[tx-period < 0 - 65535 >]
Sets the period the port waits to retransmit the next
EAPOL PDU during an authentication session.
(Default: 30 seconds)
[supplicant-timeout < 1 - 300 >]
Sets the period of time the switch waits for a supplicant
response to an EAP request. If the supplicant does not
respond within the configured time frame, the session
times out. (Default: 30 seconds)
[server-timeout < 1 - 300 >]
Sets the period of time the switch waits for a server
response to an authentication request. If there is no
response within the configured time frame, the switch
assumes that the authentication attempt has timed
out. Depending on the current max-requests setting, the
switch will either send a new request to the server or
end the authentication session. (Default: 30 seconds)
[max-requests < 1 - 10 >]
Sets the number of authentication attempts that must
time-out before authentication fails and the authenti-
cation session ends. If you are using the Local authen-
tication option, or are using RADIUS authentication
with only one host server, the switch will not start
another session until a client tries a new access
attempt. If you are using RADIUS authentication with
two or three host servers, the switch will open a session
with each server, in turn, until authentication occurs
or there are no more servers to try. During the quiet-
period (previous page), if any, you cannot reconfigure
this parameter. (Default: 2)
—Continued—

Table of Contents

Other manuals for HP ProCurve 2510G Series

Question and Answer IconNeed help?

Do you have a question about the HP ProCurve 2510G Series and is the answer not in the manual?

HP ProCurve 2510G Series Specifications

General IconGeneral
Switching Capacity48 Gbps
Forwarding Rate35.7 Mpps
ManageableYes
Storage Temperature-40°C to 70°C
Ports24 x 10/100/1000 ports
Memory128 MB
Jumbo Frame SupportYes
LayerLayer 2
FeaturesVLAN, QoS, ACLs, IGMP snooping
ManagementWeb interface, CLI, SNMP
Security FeaturesRADIUS, TACACS+
Power SupplyInternal power supply
Operating Temperature0°C to 45°C
Power over Ethernet (PoE)Optional (PoE models available)

Summary

Getting Started

Introduction

Introduces the Access Security Guide and its purpose for ProCurve switches.

Overview of Access Security Features

Lists and briefly describes the security features covered in the guide.

Conventions

Explains the conventions used for command syntax and displayed information in the guide.

Sources for More Information

Directs users to additional resources for switch operation and features not covered.

Need Only a Quick Start?

Provides guidance for users who need basic setup and IP addressing instructions.

Configuring Username and Password Security

Overview

Explains the Manager and Operator console access levels and password configuration.

Configuring Local Password Security

Details how to set, delete, and recover local passwords for console access.

Front-Panel Security

Covers disabling front-panel buttons for password reset and factory default restoration.

Password Recovery

Describes the process for recovering lost passwords using ProCurve support.

Web and MAC Authentication

Overview

Introduces Web and MAC Authentication as edge network security features using RADIUS.

General Features

Lists key features of Web and MAC Authentication, including RADIUS use and VLAN assignment.

How Web and MAC Authentication Operate

Explains the authentication process for Web and MAC authentication methods.

General Setup Procedure for Web/MAC Authentication

Outlines the necessary steps before configuring Web or MAC authentication.

Configuring Web Authentication

Provides instructions for setting up Web-based authentication on switch ports.

Configuring MAC Authentication on the Switch

Details the steps for configuring MAC-based authentication on switch ports.

TACACS+ Authentication

Overview

Introduces TACACS+ for network-wide user access control using a central server.

General System Requirements

Lists the necessary components and configurations for TACACS+ authentication.

Configuring TACACS+ on the Switch

Covers commands and procedures for configuring the switch for TACACS+ operation.

How Authentication Operates

Explains the general process of TACACS+ authentication.

Messages Related to TACACS+ Operation

Lists and explains CLI messages related to TACACS+ operation.

RADIUS Authentication, Authorization and Accounting

Overview

Introduces RADIUS for user authentication, authorization, and accounting.

General RADIUS Setup Procedure

Details the preparation steps for configuring RADIUS authentication on the switch.

Configuring the Switch for RADIUS Authentication

Guides on configuring the switch to access RADIUS servers and authentication methods.

Commands Authorization

Explains how to authorize CLI commands for users based on RADIUS attributes.

Configuring RADIUS Accounting

Provides instructions for configuring RADIUS accounting to track user activity and system events.

Viewing RADIUS Statistics

Shows how to view RADIUS configuration, authentication, and accounting statistics.

Configuring Secure Shell (SSH)

Overview

Introduces SSHv2 for secure remote management via encrypted paths.

Prerequisite for Using SSH

Outlines the requirements for using SSH, including client application installation.

Steps for Configuring and Using SSH for Switch and Client Authentication

Details the steps for setting up SSH for both switch and client authentication.

General Operating Rules and Notes

Provides important rules and notes regarding SSH operation and security.

Configuring the Switch for SSH Operation

Guides on configuring SSH, including key generation and authentication methods.

Messages Related to SSH Operation

Lists and explains common CLI messages related to SSH operation.

Configuring Secure Socket Layer (SSL)

Overview

Introduces SSL/TLS for secure web transactions and server certificate authentication.

Terminology

Defines key terms related to SSL, certificates, and encryption.

Prerequisite for Using SSL

Lists requirements for using SSL, including browser application installation.

Steps for Configuring and Using SSL for Switch and Client Authentication

Details the steps for enabling SSL for switch and client authentication.

General Operating Rules and Notes

Provides important rules and notes for SSL operation and certificate management.

Common Errors in SSL Setup

Lists common errors encountered during SSL setup and their possible causes.

Configuring Port-Based and Client-Based Access Control (802.1X)

Overview

Introduces 802.1X for simplifying security management and providing access control.

General Features

Lists key features of 802.1X, including authenticator/supplicant roles and EAP/CHAP support.

Terminology

Defines terms related to 802.1X, VLANs, authenticators, and supplicants.

General Setup Procedure for 802.1X Access Control

Outlines the preparatory steps before configuring 802.1X operation.

Configuring Switch Ports as 802.1X Authenticators

Guides on enabling ports as 802.1X authenticators and specifying authentication types.

802.1X Open VLAN Mode

Explains the 802.1X Open VLAN mode for configuring unauthorized-client and authorized-client VLANs.

Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Devices

Details how to use port security with 802.1X authenticators to allow only specific devices.

Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches

Guides on configuring switch ports to act as supplicants for 802.1X connections.

Displaying 802.1X Configuration, Statistics, and Counters

Shows how to display 802.1X configuration, statistics, and counters.

How RADIUS/802.1X Authentication Affects VLAN Operation

Explains how RADIUS/802.1X authentication impacts VLAN assignments on ports.

Messages Related to 802.1X Operation

Lists and explains operating messages related to 802.1X.

Configuring and Monitoring Port Security

Overview

Introduces Port Security for defining authorized MAC addresses per port.

Basic Operation

Describes default port security operation and intruder protection mechanisms.

Blocking Unauthorized Traffic

Explains how switch security measures block unauthorized traffic without disabling ports.

Planning Port Security

Guides on planning port security configuration, monitoring, and actions.

Port Security Command Options and Operation

Details CLI commands for configuring port security, including learn modes and actions.

MAC Lockdown

Explains MAC Lockdown for permanent MAC address assignment to ports and VLANs.

Differences Between MAC Lockdown and Port Security

Compares MAC Lockdown and Port Security features and their implementation.

Reading Intrusion Alerts and Resetting Alert Flags

Covers how to read intrusion alerts, reset flags, and use the Intrusion Log.

Configuring Protected Ports

Explains how to configure protected ports to control inter-port communication.

Using Authorized IP Managers

Overview

Introduces the Authorized IP Managers feature for IP-based access control to the switch.

Configuration Options

Details configurable options for authorized manager addresses and access privileges.

Access Levels

Describes Manager and Operator access levels assigned to authorized stations.

Defining Authorized Management Stations

Explains how to authorize single stations or groups of stations for switch access.

Building IP Masks

Details how to use IP masks to define ranges of authorized IP addresses for management access.

Operating Notes

Provides important notes and security precautions for using Authorized IP Managers.

Related product manuals