OneStart

HP FlexNetwork 10500 Series Security Configuration Manual Manual pdf 96 page image

HP FlexNetwork 10500 Series Security Configuration Manual

Also see for 10500 series: SpecificationsDatasheetCommand referenceDatasheetSpecifications

Page 1 previewPage 2 previewPage 3 previewPage 4 previewPage 5 previewPage 6 previewPage 7 previewPage 8 previewPage 9 previewPage 10 previewPage 11 previewPage 12 previewPage 13 previewPage 14 previewPage 15 previewPage 16 previewPage 17 previewPage 18 previewPage 19 previewPage 20 previewPage 21 previewPage 22 previewPage 23 previewPage 24 previewPage 25 previewPage 26 previewPage 27 previewPage 28 previewPage 29 previewPage 30 previewPage 31 previewPage 32 previewPage 33 previewPage 34 previewPage 35 previewPage 36 previewPage 37 previewPage 38 previewPage 39 previewPage 40 previewPage 41 previewPage 42 previewPage 43 previewPage 44 previewPage 45 previewPage 46 previewPage 47 previewPage 48 previewPage 49 previewPage 50 previewPage 51 previewPage 52 previewPage 53 previewPage 54 previewPage 55 previewPage 56 previewPage 57 previewPage 58 previewPage 59 previewPage 60 previewPage 61 previewPage 62 previewPage 63 previewPage 64 previewPage 65 previewPage 66 previewPage 67 previewPage 68 previewPage 69 previewPage 70 previewPage 71 previewPage 72 previewPage 73 previewPage 74 previewPage 75 previewPage 76 previewPage 77 previewPage 78 previewPage 79 previewPage 80 previewPage 81 previewPage 82 previewPage 83 previewPage 84 previewPage 85 previewPage 86 previewPage 87 previewPage 88 previewPage 89 previewPage 90 previewPage 91 previewPage 92 previewPage 93 previewPage 94 previewPage 95 previewPage 96 previewPage 97 previewPage 98 previewPage 99 previewPage 100 previewPage 101 previewPage 102 previewPage 103 previewPage 104 previewPage 105 previewPage 106 previewPage 107 previewPage 108 previewPage 109 previewPage 110 previewPage 111 previewPage 112 previewPage 113 previewPage 114 previewPage 115 previewPage 116 previewPage 117 previewPage 118 previewPage 119 previewPage 120 previewPage 121 previewPage 122 previewPage 123 previewPage 124 previewPage 125 previewPage 126 previewPage 127 previewPage 128 previewPage 129 previewPage 130 previewPage 131 previewPage 132 previewPage 133 previewPage 134 previewPage 135 previewPage 136 previewPage 137 previewPage 138 previewPage 139 previewPage 140 previewPage 141 previewPage 142 previewPage 143 previewPage 144 previewPage 145 previewPage 146 previewPage 147 previewPage 148 previewPage 149 previewPage 150 previewPage 151 previewPage 152 previewPage 153 previewPage 154 previewPage 155 previewPage 156 previewPage 157 previewPage 158 previewPage 159 previewPage 160 previewPage 161 previewPage 162 previewPage 163 previewPage 164 previewPage 165 previewPage 166 previewPage 167 previewPage 168 previewPage 169 previewPage 170 previewPage 171 previewPage 172 previewPage 173 previewPage 174 previewPage 175 previewPage 176 previewPage 177 previewPage 178 previewPage 179 previewPage 180 previewPage 181 previewPage 182 previewPage 183 previewPage 184 previewPage 185 previewPage 186 previewPage 187 previewPage 188 previewPage 189 previewPage 190 previewPage 191 previewPage 192 previewPage 193 previewPage 194 previewPage 195 previewPage 196 previewPage 197 previewPage 198 previewPage 199 previewPage 200 previewPage 201 previewPage 202 previewPage 203 previewPage 204 previewPage 205 previewPage 206 previewPage 207 previewPage 208 previewPage 209 previewPage 210 previewPage 211 previewPage 212 previewPage 213 previewPage 214 previewPage 215 previewPage 216 previewPage 217 previewPage 218 previewPage 219 previewPage 220 previewPage 221 previewPage 222 previewPage 223 previewPage 224 previewPage 225 previewPage 226 previewPage 227 previewPage 228 previewPage 229 previewPage 230 previewPage 231 previewPage 232 previewPage 233 previewPage 234 previewPage 235 previewPage 236 previewPage 237 previewPage 238 previewPage 239 previewPage 240 previewPage 241 previewPage 242 previewPage 243 previewPage 244 previewPage 245 previewPage 246 previewPage 247 previewPage 248 previewPage 249 previewPage 250 previewPage 251 previewPage 252 previewPage 253 previewPage 254 previewPage 255 previewPage 256 previewPage 257 previewPage 258 previewPage 259 previewPage 260 previewPage 261 previewPage 262 previewPage 263 previewPage 264 previewPage 265 previewPage 266 previewPage 267 previewPage 268 previewPage 269 previewPage 270 previewPage 271 previewPage 272 previewPage 273 previewPage 274 previewPage 275 previewPage 276 previewPage 277 previewPage 278 previewPage 279 previewPage 280 previewPage 281 previewPage 282 previewPage 283 previewPage 284 previewPage 285 previewPage 286 previewPage 287 previewPage 288 previewPage 289 previewPage 290 previewPage 291 previewPage 292 previewPage 293 previewPage 294 previewPage 295 previewPage 296 previewPage 297 previewPage 298 previewPage 299 previewPage 300 previewPage 301 previewPage 302 previewPage 303 previewPage 304 previewPage 305 previewPage 306 previewPage 307 previewPage 308 previewPage 309 previewPage 310 previewPage 311 previewPage 312 previewPage 313 previewPage 314 previewPage 315 previewPage 316 previewPage 317 previewPage 318 previewPage 319 previewPage 320 previewPage 321 previewPage 322 previewPage 323 previewPage 324 previewPage 325 previewPage 326 previewPage 327 previewPage 328 previewPage 329 previewPage 330 previewPage 331 previewPage 332 previewPage 333 previewPage 334 previewPage 335 previewPage 336 previewPage 337 previewPage 338 previewPage 339 previewPage 340 previewPage 341 previewPage 342 previewPage 343 previewPage 344 previewPage 345 previewPage 346 previewPage 347 previewPage 348 previewPage 349 previewPage 350 previewPage 351 previewPage 352 previewPage 353 previewPage 354 previewPage 355 previewPage 356 previewPage 357 previewPage 358 previewPage 359 previewPage 360 previewPage 361 previewPage 362 previewPage 363 previewPage 364 previewPage 365 previewPage 366 previewPage 367 previewPage 368 previewPage 369 previewPage 370 previewPage 371 previewPage 372 previewPage 373 previewPage 374 previewPage 375 previewPage 376 previewPage 377 previewPage 378 previewPage 379 previewPage 380 previewPage 381 previewPage 382 previewPage 383 previewPage 384 previewPage 385 previewPage 386 previewPage 387 previewPage 388 previewPage 389 previewPage 390 previewPage 391 previewPage 392 previewPage 393 previewPage 394 previewPage 395 previewPage 396 previewPage 397 previewPage 398 previewPage 399 previewPage 400 previewPage 401 previewPage 402 previewPage 403 previewPage 404 previewPage 405 previewPage 406 previewPage 407 previewPage 408 previewPage 409 previewPage 410 previewPage 411 previewPage 412 previewPage 413 previewPage 414 previewPage 415 previewPage 416 previewPage 417 previewPage 418 previewPage 419 previewPage 420 previewPage 421 previewPage 422 previewPage 423 previewPage 424 previewPage 425 previewPage 426 previewPage 427 previewPage 428 previewPage 429 previewPage 430 previewPage 431 previewPage 432 previewPage 433 previewPage 434 previewPage 435 previewPage 436 previewPage 437 previewPage 438 previewPage 439 previewPage 440 previewPage 441 previewPage 442 previewPage 443 previewPage 444 previewPage 445 previewPage 446 previewPage 447 previewPage 448 previewPage 449 previewPage 450 previewPage 451 previewPage 452 previewPage 453 previewPage 454 previewPage 455 previewPage 456 previewPage 457 previewPage 458 previewPage 459 previewPage 460 previewPage 461 previewPage 462 previewPage 463 previewPage 464 previewPage 465 previewPage 466 previewPage 467 previewPage 468 previewPage 469 previewPage 470 previewPage 471 previewPage 472 previewPage 473 previewPage 474 previewPage 475 previewPage 476 previewPage 477 previewPage 478 previewPage 479 previewPage 480 previewPage 481 previewPage 482 previewPage 483 previewPage 484 previewPage 485 previewPage 486 previewPage 487 previewPage 488 previewPage 489 previewPage 490 previewPage 491 previewPage 492 previewPage 493 previewPage 494 previewPage 495 previewPage 496 previewPage 497 previewPage 498 previewPage 499 previewPage 500 previewPage 501 previewPage 502 previewPage 503 previewPage 504 previewPage 505 previewPage 506 previewPage 507 previewPage 508 previewPage 509 previewPage 510 previewPage 511 previewPage 512 previewPage 513 previewPage 514 previewPage 515 previewPage 516 previewPage 517 previewPage 518 previewPage 519 previewPage 520 previewPage 521 previewPage 522 previewPage 523 previewPage 524 previewPage 525 previewPage 526 previewPage 527 previewPage 528 previewPage 529 previewPage 530 previewPage 531 previewPage 532 previewPage 533 previewPage 534 previewPage 535 previewPage 536 previewPage 537 previewPage 538 previewPage 539 previewPage 540 previewPage 541 previewPage 542 previewPage 543 previewPage 544 previewPage 545 previewPage 546 previewPage 547 previewPage 548 previewPage 549 previewPage 550 previewPage 551 previewPage 552 previewPage 553 previewPage 554 previewPage 555 previewPage 556 previewPage 557 previewPage 558 previewPage 559 previewPage 560 previewPage 561 previewPage 562 previewPage 563 previewPage 564 previewPage 565 previewPage 566 previewPage 567 previewPage 568 previewPage 569 previewPage 570 previewPage 571 previewPage 572 previewPage 573 previewPage 574 previewPage 575 previewPage 576 previewPage 577 previewPage 578 previewPage 579 previewPage 580 previewPage 581 previewPage 582 previewPage 583 previewPage 584 previewPage 585 previewPage 586 previewPage 587 previewPage 588 previewPage 589 previewPage 590 previewPage 591 previewPage 592 previewPage 593 previewPage 594 previewPage 595 previewPage 596 preview
Contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Configuring AAA
  14. RADIUS
  15. HWTACACS
  16. LDAP
  17. AAA implementation on the device
  18. AAA for MPLS L3VPNs
  19. RADIUS attributes
  20. FIPS compliance
  21. Configuring AAA schemes
  22. configuring user group attributes
  23. Configuring RADIUS schemes
  24. Configuring HWTACACS schemes
  25. Configuring LDAP schemes
  26. Configuring AAA methods for ISP domains
  27. Creating an ISP domain
  28. Configuring authentication methods for an ISP domain
  29. Configuring authorization methods for an ISP domain
  30. Configuring accounting methods for an ISP domain
  31. Enabling the session-control feature
  32. Configuring the RADIUS DAE server feature
  33. Configuring a NAS-ID profile
  34. Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users
  35. Authentication and authorization for SSH users by a RADIUS server
  36. Authentication for SSH users by an LDAP server
  37. AAA for 802.1X users by a RADIUS server
  38. Troubleshooting RADIUS
  39. RADIUS packet delivery failure
  40. Troubleshooting LDAP
  41. X overview
  42. X-related protocols
  43. EAP over RADIUS
  44. X authentication initiation
  45. X authentication procedures
  46. EAP relay
  47. EAP termination
  48. Configuring 802.1X
  49. Guest VLAN
  50. Auth-Fail VLAN
  51. Critical VLAN
  52. Using 802.1X authentication with other features
  53. Redirect URL assignment
  54. Configuration prerequisites
  55. Enabling 802.1X
  56. Enabling EAP relay or EAP termination
  57. Specifying an access control method
  58. Setting the 802.1X authentication timeout timers
  59. Configuration guidelines
  60. Configuration procedure
  61. Enabling the periodic online user reauthentication feature
  62. Manually reauthenticating all online 802.1X users on a port
  63. Configuring an 802.1X guest VLAN
  64. Enabling the 802.1X critical voice VLAN
  65. Sending EAP-Success packets for 802.1X users assignment to the 802.1X critical VLAN
  66. Enabling 802.1X guest VLAN assignment delay
  67. Configuring 802.1X SmartOn
  68. Displaying and maintaining 802.1X
  69. X guest VLAN and authorization VLAN configuration example
  70. X with ACL assignment configuration example
  71. X with EAD assistant configuration example (with DHCP relay agent)
  72. X with EAD assistant configuration example (with DHCP server)
  73. X SmartOn configuration example
  74. Troubleshooting 802.1X EAD assistant for Web browser users
  75. Configuring MAC authentication
  76. VLAN assignment
  77. ACL assignment
  78. Configuration task list
  79. Configuring the user account format
  80. Enabling MAC authentication offline detection
  81. Configuring MAC authentication delay
  82. Configuration restrictions and guidelines
  83. Configuring a MAC authentication critical VLAN
  84. Enabling the MAC authentication critical voice VLAN
  85. Including user IP addresses in MAC authentication requests
  86. MAC authentication configuration examples
  87. RADIUS-based MAC authentication configuration example
  88. ACL assignment configuration example
  89. ftp server
  90. Configuring portal authentication
  91. Interaction between portal system components
  92. Portal support for EAP
  93. Portal configuration task list
  94. Configuring a portal authentication server
  95. Enabling portal authentication on an interface
  96. Specifying a portal Web server on an interface
  97. Configuring an authentication source subnet
  98. Configuring an authentication destination subnet
  99. Setting the maximum number of portal users
  100. Enabling outgoing packets filtering on a portal-enabled interface
  101. Configuring portal authentication server detection
  102. Configuring portal Web server detection
  103. Configuring portal user synchronization
  104. Configuring the portal fail-permit feature
  105. Applying a NAS-ID profile to an interface
  106. Configuring the local portal Web server feature
  107. Configuring a local portal Web server
  108. Logging out online portal users
  109. Portal configuration examples
  110. authentication server
  111. Configuring re-DHCP portal authentication
  112. Configuring cross-subnet portal authentication
  113. Configuring extended direct portal authentication
  114. Configuring extended re-DHCP portal authentication
  115. Configuring extended cross-subnet portal authentication
  116. Configuring portal server detection and portal user synchronization
  117. Configuring cross-subnet portal authentication for MPLS L3VPNs
  118. Configuring direct portal authentication using the local portal Web server
  119. Troubleshooting portal
  120. Cannot log out portal users on the RADIUS server
  121. Configuring port security
  122. General guidelines and restrictions
  123. Setting port security's limit on the number of secure MAC addresses on a port
  124. Configuring port security features
  125. Configuring secure MAC addresses
  126. Enabling MAC move
  127. Applying a NAS-ID profile to port security
  128. Port security configuration examples
  129. userLoginWithOUI configuration example
  130. configure port security
  131. macAddressElseUserLoginSecure configuration example
  132. Troubleshooting port security
  133. Configuring password control
  134. Password updating and expiration
  135. User login control
  136. Setting global password control parameters
  137. Setting user group password control parameters
  138. Setting local user password control parameters
  139. Displaying and maintaining password control
  140. Verifying the configuration
  141. Managing public keys
  142. Distributing a local host public key
  143. Destroying a local key pair
  144. Entering a peer host public key
  145. Example for importing a public key from a public key file
  146. Configuring SSL
  147. Configuring an SSL client policy
  148. Displaying and maintaining SSL
  149. Configuring PKI
  150. PKI architecture
  151. PKI applications
  152. Configuring a PKI domain
  153. Requesting a certificate
  154. Configuring automatic certificate request
  155. Aborting a certificate request
  156. Verifying certificates without CRL checking
  157. Specifying the storage path for the certificates and CRLs
  158. Removing a certificate
  159. Displaying and maintaining PKI
  160. Requesting a certificate from an RSA Keon CA server
  161. Requesting a certificate from a Windows Server 2003 CA server
  162. Requesting a certificate from an OpenCA server
  163. Certificate-based access control policy configuration example
  164. Certificate import and export configuration example
  165. Troubleshooting PKI configuration
  166. Failed to obtain the CA certificate
  167. Failed to request local certificates
  168. Failed to obtain CRLs
  169. Failed to import the local certificate
  170. Failed to set the storage path
  171. Configuring IPsec
  172. Security association
  173. IPsec implementation
  174. IPsec RRI
  175. Protocols and standards
  176. Configuring an ACL
  177. Configuring an IPsec transform set
  178. Configuring a manual IPsec policy
  179. Configuring an IKE-based IPsec policy
  180. Applying an IPsec policy to an interface
  181. Enabling ACL checking for de-encapsulated packets
  182. Configuring IPsec anti-replay redundancy
  183. Binding a source interface to an IPsec policy
  184. Enabling logging of IPsec packets
  185. Configuring the DF bit of IPsec packets
  186. Configuring IPsec for IPv6 routing protocols
  187. Configuring SNMP notifications for IPsec
  188. Displaying and maintaining IPsec
  189. IPsec configuration examples
  190. Configuring an IKE-based IPsec tunnel for IPv4 packets
  191. Configuring an IKE-based IPsec tunnel for IPv6 packets
  192. Configuring IPsec for RIPng
  193. Configuring IKE
  194. IKE security mechanism
  195. Configuring an IKE profile
  196. Configuring an IKE proposal
  197. Configuring an IKE keychain
  198. Configuring the global identity information
  199. Configuring the IKE keepalive feature
  200. Enabling invalid SPI recovery
  201. Setting the maximum number of IKE SAs
  202. Displaying and maintaining IKE
  203. Aggressive mode with RSA signature authentication configuration example
  204. Troubleshooting IKE
  205. IPsec SA negotiation failed because no matching IPsec transform sets were found
  206. Configuring IKEv2
  207. New features in IKEv2
  208. Configuring an IKEv2 profile
  209. Configuring an IKEv2 policy
  210. Configuring an IKEv2 proposal
  211. Configuring an IKEv2 keychain
  212. Configure global IKEv2 parameters
  213. Configuring the IKEv2 NAT keepalive feature
  214. IKEv2 configuration examples
  215. IKEv2 with RSA signature authentication configuration example
  216. Troubleshooting IKEv2
  217. Configuring SSH
  218. SSH authentication methods
  219. SSH support for Suite B
  220. Enabling the Stelnet server
  221. Enabling the SCP server
  222. Configuring a client's host public key
  223. Configuring an SSH user
  224. Configuring the SSH management parameters
  225. Specifying a PKI domain for the SSH server
  226. Specifying the source IP address for SSH packets
  227. Establishing a connection to an Stelnet server based on Suite B
  228. Establishing a connection to an SFTP server
  229. Establishing a connection to an SFTP server based on Suite B
  230. Working with SFTP directories
  231. Displaying help information
  232. Establishing a connection to an SCP server based on Suite B
  233. Specifying public key algorithms for SSH2
  234. Specifying MAC algorithms for SSH2
  235. Publickey authentication enabled Stelnet server configuration example
  236. Password authentication enabled Stelnet client configuration example
  237. Publickey authentication enabled Stelnet client configuration example
  238. Stelnet configuration example based on 128-bit Suite B algorithms
  239. SFTP configuration examples
  240. Password authentication enabled SFTP server configuration example
  241. Publickey authentication enabled SFTP client configuration example
  242. SFTP configuration example based on 192-bit Suite B algorithms
  243. SCP configuration examples
  244. SCP configuration example based on Suite B algorithms
  245. NETCONF over SSH configuration example with password authentication
  246. Configuring IP source guard
  247. Dynamic IPSG bindings
  248. Configuring the IPv4SG feature
  249. Configuring the IPv6SG feature
  250. Displaying and maintaining IPSG
  251. IPSG configuration examples
  252. Dynamic IPv4SG using DHCP snooping configuration example
  253. Dynamic IPv4SG using DHCP relay configuration example
  254. Static IPv6SG configuration example
  255. Dynamic IPv6SG using DHCPv6 snooping configuration example
  256. Configuring ARP attack protection
  257. Configuring ARP source suppression
  258. Configuration example
  259. Configuring ARP packet rate limit
  260. Configuring source MAC-based ARP attack detection
  261. Configuring ARP packet source MAC consistency check
  262. Configuring authorized ARP
  263. Configuration example (on a DHCP relay agent)
  264. Configuring ARP detection
  265. Configuring user validity check
  266. Configuring ARP packet validity check
  267. Enabling ARP detection logging
  268. User validity check and ARP packet validity check configuration example
  269. Configuring ARP scanning and fixed ARP
  270. Configuring the checking of sender IP addresses for ARP packets
  271. Configuring uRPF
  272. uRPF operation
  273. Network application
  274. Configuring IPv6 uRPF
  275. IPv6 uRPF operation
  276. Configuring FIPS
  277. Configuring FIPS mode
  278. Configuration changes in FIPS mode
  279. Exiting FIPS mode
  280. Power-up self-tests
  281. Triggering self-tests
  282. Entering FIPS mode through manual reboot
  283. Exiting FIPS mode through automatic reboot
  284. Configuring attack detection and prevention
  285. Scanning attacks
  286. Flood attacks
  287. TCP fragment attack
  288. Attack detection and prevention configuration task list
  289. Configuring a scanning attack defense policy
  290. Configuring attack detection exemption
  291. Applying an attack defense policy to the device
  292. Configuring TCP fragment attack prevention
  293. Configuring login attack prevention
  294. Displaying and maintaining attack detection and prevention
  295. Attack detection and prevention configuration examples
  296. IP blacklist configuration example
  297. Configuring MACsec
  298. MACsec applications
  299. MACsec configuration task list
  300. Configuring a preshared key
  301. Configuring the MACsec confidentiality offset
  302. Configuring MACsec protection parameters by MKA policy
  303. Applying an MKA policy
  304. Troubleshooting MACsec
  305. Configuring MFF
  306. Basic concepts
  307. MFF working mechanism
  308. Configuring a network port
  309. Displaying and maintaining MFF
  310. Auto-mode MFF configuration example in a ring network
  311. Manual-mode MFF configuration example in a tree network
  312. Manual-mode MFF configuration example in a ring network
  313. Configuring ND attack defense
  314. Configuring ND attack detection
  315. Specifying the role of the attached device
  316. Enabling the RA guard logging feature
  317. Configuring keychains
  318. Displaying and maintaining keychain
  319. configuring switch b
  320. Document conventions and icons
  321. Network topology icons
  322. Support and other resources
  323. Websites
  324. Index
/ 596
Related manuals for HP 10500 series
HP FlexNetwork 10500 Series Configuration Manual first page preview
HP FlexNetwork 10500 Series Configuration Manual
HP FlexNetwork 7500 Series Configuration Manual first page preview
HP FlexNetwork 7500 Series Configuration Manual
HP HPE FlexNetwork 7500 series Configuration Manual first page preview
HP HPE FlexNetwork 7500 series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP 10500 Series Configuration Manual first page preview
HP 10500 Series Configuration Manual
HP FlexFabric 5700 Series Security Configuration Manual first page preview
HP FlexFabric 5700 Series Security Configuration Manual
HP 12500 Series Configuration Manual first page preview
HP 12500 Series Configuration Manual
This manual is suitable for:
10500 series