HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 144
Configuring a user profile, Overview, User profile configuration task list
View all HP 6125G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 144 highlights
Configuring a user profile Overview A user profile provides a configuration template to save predefined configurations, such as a Quality of Service (QoS) policy. Different user profiles are applicable to different application scenarios. The user profile supports working with 802.1X authentication. It is capable of restricting authenticated users' behaviors. After the authentication server verifies a user, it sends the device the name of the user profile that is associated with the user. Then the device applies the configurations in the user profile if the profile is enabled, and allows user access based on all valid configurations. If the user profile is not enabled, the device denies the user access. After the user logs out, the device automatically disables the configurations in the user profile, and the restrictions on the users are removed. Without user profiles, service applications are based on interface, VLAN, or globally, and a policy applies to any user that accesses the interface, or VLAN, or device. If a user moves between ports to access a device, to restrict the user behavior, you must remove the policy from the previous port and then configure the same policy on the port that the user uses. The configuration task is tedious and error prone. User profiles provide flexible user-based service applications because a user profile is associated with a target user. Every time the user accesses the device, the device automatically applies the configurations in the associated user profile. User profile configuration task list Task Creating a user profile Applying a QoS policy Enabling a user profile Remarks Required Required Required Creating a user profile Before you create a user profile, complete the following tasks: • Configure authentication parameters on the device. • Perform configurations on the client, the device, and the authentication server, for example, username, password, authentication scheme, domain, and binding a user profile with a user. To create a user profile: Step 1. Enter system view. 2. Create a user profile, and enter its view. Command system-view user-profile profile-name Remarks N/A You can use the command to enter the view of an existing user profile. 134