OneStart

HP 10500 Series Configuration Manual Manual pdf 81 page image

HP 10500 Series Configuration Manual

Also see for 10500 series: SpecificationsDatasheetCommand referenceDatasheetSpecifications

Page 1 previewPage 2 previewPage 3 previewPage 4 previewPage 5 previewPage 6 previewPage 7 previewPage 8 previewPage 9 previewPage 10 previewPage 11 previewPage 12 previewPage 13 previewPage 14 previewPage 15 previewPage 16 previewPage 17 previewPage 18 previewPage 19 previewPage 20 previewPage 21 previewPage 22 previewPage 23 previewPage 24 previewPage 25 previewPage 26 previewPage 27 previewPage 28 previewPage 29 previewPage 30 previewPage 31 previewPage 32 previewPage 33 previewPage 34 previewPage 35 previewPage 36 previewPage 37 previewPage 38 previewPage 39 previewPage 40 previewPage 41 previewPage 42 previewPage 43 previewPage 44 previewPage 45 previewPage 46 previewPage 47 previewPage 48 previewPage 49 previewPage 50 previewPage 51 previewPage 52 previewPage 53 previewPage 54 previewPage 55 previewPage 56 previewPage 57 previewPage 58 previewPage 59 previewPage 60 previewPage 61 previewPage 62 previewPage 63 previewPage 64 previewPage 65 previewPage 66 previewPage 67 previewPage 68 previewPage 69 previewPage 70 previewPage 71 previewPage 72 previewPage 73 previewPage 74 previewPage 75 previewPage 76 previewPage 77 previewPage 78 previewPage 79 previewPage 80 previewPage 81 previewPage 82 previewPage 83 previewPage 84 previewPage 85 previewPage 86 previewPage 87 previewPage 88 previewPage 89 previewPage 90 previewPage 91 previewPage 92 previewPage 93 previewPage 94 previewPage 95 previewPage 96 previewPage 97 previewPage 98 previewPage 99 previewPage 100 previewPage 101 previewPage 102 previewPage 103 previewPage 104 previewPage 105 previewPage 106 previewPage 107 previewPage 108 previewPage 109 previewPage 110 previewPage 111 previewPage 112 previewPage 113 previewPage 114 previewPage 115 previewPage 116 previewPage 117 previewPage 118 previewPage 119 previewPage 120 previewPage 121 previewPage 122 previewPage 123 previewPage 124 previewPage 125 previewPage 126 previewPage 127 previewPage 128 previewPage 129 previewPage 130 previewPage 131 previewPage 132 previewPage 133 previewPage 134 previewPage 135 previewPage 136 previewPage 137 previewPage 138 previewPage 139 previewPage 140 previewPage 141 previewPage 142 previewPage 143 previewPage 144 previewPage 145 previewPage 146 previewPage 147 previewPage 148 previewPage 149 previewPage 150 previewPage 151 previewPage 152 previewPage 153 previewPage 154 previewPage 155 previewPage 156 previewPage 157 previewPage 158 previewPage 159 previewPage 160 previewPage 161 previewPage 162 previewPage 163 previewPage 164 previewPage 165 previewPage 166 previewPage 167 previewPage 168 previewPage 169 previewPage 170 previewPage 171 previewPage 172 previewPage 173 previewPage 174 previewPage 175 previewPage 176 previewPage 177 previewPage 178 previewPage 179 previewPage 180 previewPage 181 previewPage 182 previewPage 183 previewPage 184 previewPage 185 previewPage 186 previewPage 187 previewPage 188 previewPage 189 previewPage 190 previewPage 191 previewPage 192 previewPage 193 previewPage 194 previewPage 195 previewPage 196 previewPage 197 previewPage 198 previewPage 199 previewPage 200 previewPage 201 previewPage 202 previewPage 203 previewPage 204 previewPage 205 previewPage 206 previewPage 207 previewPage 208 previewPage 209 previewPage 210 previewPage 211 previewPage 212 previewPage 213 previewPage 214 previewPage 215 previewPage 216 previewPage 217 previewPage 218 previewPage 219 previewPage 220 previewPage 221 previewPage 222 previewPage 223 previewPage 224 previewPage 225 previewPage 226 previewPage 227 previewPage 228 previewPage 229 previewPage 230 previewPage 231 previewPage 232 previewPage 233 previewPage 234 previewPage 235 previewPage 236 previewPage 237 previewPage 238 previewPage 239 previewPage 240 previewPage 241 previewPage 242 previewPage 243 previewPage 244 previewPage 245 previewPage 246 previewPage 247 previewPage 248 previewPage 249 previewPage 250 previewPage 251 previewPage 252 previewPage 253 previewPage 254 previewPage 255 previewPage 256 previewPage 257 previewPage 258 previewPage 259 previewPage 260 previewPage 261 previewPage 262 previewPage 263 previewPage 264 previewPage 265 previewPage 266 previewPage 267 previewPage 268 previewPage 269 previewPage 270 previewPage 271 previewPage 272 previewPage 273 previewPage 274 previewPage 275 previewPage 276 previewPage 277 previewPage 278 previewPage 279 previewPage 280 previewPage 281 previewPage 282 previewPage 283 previewPage 284 previewPage 285 previewPage 286 previewPage 287 previewPage 288 previewPage 289 previewPage 290 previewPage 291 previewPage 292 previewPage 293 previewPage 294 previewPage 295 previewPage 296 previewPage 297 previewPage 298 previewPage 299 previewPage 300 previewPage 301 previewPage 302 previewPage 303 previewPage 304 previewPage 305 previewPage 306 previewPage 307 previewPage 308 previewPage 309 previewPage 310 previewPage 311 previewPage 312 previewPage 313 previewPage 314 previewPage 315 previewPage 316 previewPage 317 previewPage 318 previewPage 319 previewPage 320 previewPage 321 previewPage 322 previewPage 323 previewPage 324 previewPage 325 previewPage 326 previewPage 327 previewPage 328 previewPage 329 previewPage 330 previewPage 331 previewPage 332 previewPage 333 previewPage 334 previewPage 335 previewPage 336 previewPage 337 previewPage 338 previewPage 339 previewPage 340 previewPage 341 previewPage 342 previewPage 343 previewPage 344 previewPage 345 previewPage 346 previewPage 347 previewPage 348 previewPage 349 previewPage 350 previewPage 351 previewPage 352 previewPage 353 previewPage 354 previewPage 355 previewPage 356 previewPage 357 previewPage 358 previewPage 359 previewPage 360 previewPage 361 previewPage 362 previewPage 363 previewPage 364 previewPage 365 previewPage 366 previewPage 367 preview
Contents
  1. configuration guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Configuring AAA
  11. RADIUS
  12. HWTACACS
  13. Domain-based user management
  14. AAA for MPLS L3VPNs
  15. RADIUS attributes
  16. FIPS compliance
  17. Configuring AAA schemes
  18. Configuring RADIUS schemes
  19. Configuring HWTACACS schemes
  20. Configuring AAA methods for ISP domains
  21. Configuration prerequisites
  22. Configuring ISP domain attributes
  23. Configuring authentication methods for an ISP domain
  24. Configuring authorization methods for an ISP domain
  25. Configuring accounting methods for an ISP domain
  26. Tearing down user connections
  27. Configuring a NAS ID-VLAN binding
  28. AAA configuration examples
  29. Local authentication and authorization for Telnet users
  30. Authentication/authorization for SSH/Telnet users by a RADIUS server
  31. AAA for portal users by a RADIUS server
  32. AAA for 802.1X users by a RADIUS server
  33. Level switching authentication for Telnet users by an HWTACACS server
  34. Troubleshooting AAA
  35. Troubleshooting HWTACACS
  36. X overview
  37. X-related protocols
  38. EAP over RADIUS
  39. Initiating 802.1X authentication
  40. X authentication procedures
  41. EAP relay
  42. EAP termination
  43. Configuring 802.1X
  44. Enabling 802.1X
  45. Setting the port authorization state
  46. Specifying an access control method
  47. Setting the 802.1X authentication timeout timers
  48. Configuration guidelines
  49. Configuring the authentication trigger function
  50. Specifying a mandatory authentication domain on a port
  51. Enabling the periodic online user re-authentication function
  52. Configuring an 802.1X guest VLAN
  53. Displaying and maintaining 802.1X
  54. Configuration procedure
  55. Verifying the configuration
  56. X guest VLAN and VLAN assignment configuration example
  57. Configuring EAD fast deployment
  58. Configuring the redirect URL
  59. EAD fast deployment configuration example
  60. Troubleshooting EAD fast deployment
  61. Configuring MAC authentication
  62. MAC authentication timers
  63. Critical VLAN
  64. Configuring MAC authentication globally
  65. Specifying a MAC authentication domain
  66. Configuring a MAC authentication critical VLAN
  67. Configuring MAC authentication delay
  68. MAC authentication configuration examples
  69. RADIUS-based MAC authentication configuration example
  70. ACL assignment configuration example
  71. Configuring portal authentication
  72. Portal authentication modes
  73. Portal support for EAP
  74. Portal authentication across VPNs
  75. Specifying the portal server
  76. Controlling access of portal users
  77. Configuring an authentication source subnet
  78. Specifying a portal authentication domain
  79. Specifying the NAS-Port-ID for an interface
  80. Specifying a source IP address for outgoing portal packets
  81. Configuring portal detection functions
  82. Configuring portal user information synchronization
  83. Logging off portal users
  84. Portal configuration examples
  85. configure the switch
  86. Configuring re-DHCP portal authentication
  87. Configuring cross-subnet portal authentication
  88. Configuring direct portal authentication with extended functions
  89. Configuring re-DHCP portal authentication with extended functions
  90. Configuring cross-subnet portal authentication with extended functions
  91. Configuring portal server detection and portal user information synchronization
  92. configuring the switch
  93. Cross-subnet portal authentication across VPNs
  94. Troubleshooting portal
  95. Configuring port security
  96. Working with guest VLAN and Auth-Fail VLAN
  97. Enabling port security
  98. Setting the port security mode
  99. Configuring NTK
  100. Enabling port security traps
  101. Ignoring authorization information from the server
  102. Port security configuration examples
  103. Configuring the userLoginWithOUI mode
  104. Configuring the macAddressElseUserLoginSecure mode
  105. Troubleshooting port security
  106. Cannot set the port security mode
  107. Configuring a user profile
  108. Applying a QoS policy
  109. Displaying and maintaining user profiles
  110. Managing public keys
  111. Creating a local asymmetric key pair
  112. Destroying a local asymmetric key pair
  113. Specifying the peer public key on the local device
  114. Displaying public keys
  115. Importing a public key from a public key file
  116. Configuring SSH
  117. SSH authentication
  118. Generating local DSA or RSA key pairs
  119. Enabling the SFTP server function
  120. Configuring a client's host public key
  121. Configuring an SSH user
  122. Setting the SSH management parameters
  123. Setting the DSCP value for packets sent by the SSH server
  124. Stelnet client configuration task list
  125. Establishing a connection to an Stelnet server
  126. Setting the DSCP value for packets sent by the Stelnet client
  127. Configuring the device as an SFTP client
  128. Working with SFTP directories
  129. Working with SFTP files
  130. Terminating the connection with the SFTP server
  131. Transferring files with an SCP server
  132. Stelnet configuration examples
  133. When the switch acts as an Stelnet server for publickey authentication
  134. When the switch acts as an Stelnet client for password authentication
  135. When the switch acts as an Stelnet client for publickey authentication
  136. SFTP configuration examples
  137. When the switch acts as an SFTP client for publickey authentication
  138. ssh connection
  139. Configuring TCP attack protection
  140. Configuring IP source guard
  141. Dynamic IPv4 source guard entries
  142. Configuring the IPv4 source guard function
  143. Configuring a static IPv4 source guard entry
  144. Setting the maximum number of IPv4 source guard entries allowed on a port
  145. Configuring a static IPv6 source guard entry
  146. Setting the maximum number of IPv6 source guard entries allowed on a port
  147. IP source guard configuration examples
  148. Dynamic IPv4 source guard using DHCP snooping
  149. Dynamic IPv4 source guard using DHCP relay
  150. Static IPv6 source guard entry configuration
  151. Global static IP source guard configuration
  152. Troubleshooting IP source guard
  153. Configuring ARP attack protection
  154. Configuring unresolvable IP attack protection
  155. Unresolvable IP attack protection configuration example
  156. Configuring ARP packet rate limit
  157. Displaying and maintaining source MAC-based ARP attack detection
  158. Configuring ARP active acknowledgement
  159. Configuring ARP detection
  160. Configuring ARP packet validity check
  161. Configuring ARP restricted forwarding
  162. User validity check and ARP packet validity check configuration example
  163. ARP restricted forwarding configuration example
  164. Configuring ARP automatic scanning and fixed ARP
  165. Configuring ND attack defense
  166. Enabling source MAC consistency check for ND packets
  167. Configuring URPF
  168. Network application
  169. URPF configuration example
  170. Configuring MFF
  171. Basic concepts
  172. MFF work flow
  173. Displaying and maintaining MFF
  174. Configuring auto-mode MFF in a ring network
  175. Configuring manual-mode MFF in a tree network
  176. Configuring manual-mode MFF in a ring network
  177. Configuring password control
  178. Enabling password control
  179. Setting global password control parameters
  180. Setting user group password control parameters
  181. Setting local user password control parameters
  182. Setting super password control parameters
  183. Password control configuration example
  184. Configuring FIPS
  185. Displaying and maintaining FIPS
  186. Configuring IPsec
  187. Protocols and standards
  188. Configuring ACLs
  189. Configuring an IPsec transform set
  190. Configuring an IPsec policy
  191. Applying an IPsec policy group to an interface
  192. Enabling ACL checking of de-encapsulated IPsec packets
  193. Configuring packet information pre-extraction
  194. Displaying and maintaining IPsec
  195. Configuring IKE
  196. IKE functions
  197. Relationship between IKE and IPsec
  198. Configuring a name for the local security gateway
  199. Configuring an IKE peer
  200. Setting keepalive timers
  201. Configuring a DPD detector
  202. Displaying and maintaining IKE
  203. Troubleshooting IKE
  204. Failing to establish an IPsec tunnel
  205. Support and other resources
  206. Conventions
  207. Index
/ 367
Related manuals for HP 10500 series
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 12500 Series Configuration Manual first page preview
HP 12500 Series Configuration Manual
HP 12500 Series Configuration Manual first page preview
HP 12500 Series Configuration Manual
HP 7500 series Configuration Manual first page preview
HP 7500 series Configuration Manual
HP A7500 Series Configuration Manual first page preview
HP A7500 Series Configuration Manual
HP A7500 Series Configuration Manual first page preview
HP A7500 Series Configuration Manual
HP 5500 HI Series Configuration Manual first page preview
HP 5500 HI Series Configuration Manual
This manual is suitable for:
10500 series