HP 6120G/XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 467
T, static filter limit, system delay, system resource usage, TACACS, TCP/UDP, troubleshooting, trunk
View all HP 6120G/XG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 467 highlights
prerequisites ... 7-5 remove self-signed certificate ... 7-9 remove server host certificate ... 7-9 reserved TCP port numbers ... 7-20 root ... 7-4 root certificate ... 7-4 self-signed ... 7-3, 7-12 self-signed certificate ... 7-3, 7-9, 7-12 server host certificate ... 7-9 SSL server ... 7-3 SSLv3 ... 7-2 steps for configuring ... 7-5 supported encryption methods ... 7-3 terminology ... 7-3 TLSv1 ... 7-2 troubleshooting, operating ... 7-21 unsecured web browser access ... 7-18 version ... 7-2 zeroize ... 7-10, 7-11 ssl cert ... 6-11 static filter limit ... 9-2 STP prerequisite for 802.1X controlled directions ... 10-27 prerequisite for web-based controlled directions ... 3-22 system delay ... 8-33 system resource usage ... 8-33 T TACACS aaa parameters ... 4-12 authentication ... 4-3 authentication process ... 4-24 authentication, local ... 4-26 authorized IP managers, effect ... 4-29 configuration, authentication ... 4-11 configuration, encryption key ... 4-22 configuration, server access ... 4-18 configuration, timeout ... 4-23 configuration, viewing ... 4-10 encryption key ... 4-6, 4-18, 4-19, 4-22 encryption key exclusion ... 4-30 encryption key, general operation ... 4-27 encryption key, global ... 4-23 encryption key, saving to configuration file ... 2-11 general operation ... 4-2 IP address, server ... 4-18 local manager password requirement ... 4-30 messages ... 4-29 NAS ... 4-3 precautions ... 4-5 preparing to configure ... 4-8 preventing switch lockout ... 4-18 privilege level code ... 4-7 server access ... 4-18 server priority ... 4-21 setup, general ... 4-5 shared secret key, saving to configuration file ... 2-15 show authentication ... 4-8 single login ... 4-13 single sign-on ... 4-13 system requirements ... 4-5 TACACS+ server ... 4-3, 4-8 testing ... 4-5 TFTP, configuration ... 4-30 timeout ... 4-18 troubleshooting ... 4-6 unauthorized access, preventing ... 4-7 web access, controlling ... 4-28 web access, no effect on ... 4-5 TCP reserved port numbers ... 7-20 TCP/UDP monitoring packets to closed ports ... 8-33 test ... 4-18 TLS See RADIUS. troubleshooting authentication via Telnet ... 4-18 authorized IP managers ... 12-13 trunk filter, source-port ... 9-2, 9-17 LACP, 802.1X not allowed ... 10-19 See also LACP. trusted port defined ... 8-18 enabling ... 8-18 trusted ports ... 8-6 enabling snooping ... 8-8 Index - 11