HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 5

Displaying and maintaining EAD fast deployment, MAC authentication configuration examples, iii

Page 5 highlights

Configuration prerequisites 98 Configuring a free IP 98 Configuring the redirect URL 99 Setting the EAD rule timer 99 Displaying and maintaining EAD fast deployment 99 EAD fast deployment configuration example 100 Network requirements 100 Configuration procedure 101 Verifying the configuration 101 Troubleshooting EAD fast deployment 102 Web browser users cannot be correctly redirected 102 Configuring MAC authentication 103 Overview 103 User account policies 103 Authentication approaches 103 MAC authentication timers 104 Using MAC authentication with other features 104 VLAN assignment 104 ACL assignment 104 Configuration task list 104 Basic configuration for MAC authentication 105 Specifying a MAC authentication domain 106 Displaying and maintaining MAC authentication 106 MAC authentication configuration examples 107 Local MAC authentication configuration example 107 RADIUS-based MAC authentication configuration example 108 ACL assignment configuration example 110 Configuring port security 113 Overview 113 Port security features 113 Port security modes 113 Working with guest VLAN and Auth-Fail VLAN 116 Configuration task list 116 Enabling port security 116 Setting port security's limit on the number of MAC addresses on a port 117 Setting the port security mode 117 Configuration prerequisites 118 Configuration procedure 118 Configuring port security features 118 Configuring NTK 118 Configuring intrusion protection 119 Enabling port security traps 119 Configuring secure MAC addresses 120 Configuration prerequisites 121 Configuration procedure 121 Ignoring authorization information 122 Displaying and maintaining port security 122 Port security configuration examples 123 Configuring the autoLearn mode 123 Configuring the userLoginWithOUI mode 125 Configuring the macAddressElseUserLoginSecure mode 129 Troubleshooting port security 132 Cannot set the port security mode 132 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

iii
Configuration prerequisites ··········································································································································· 98
Configuring a free IP ····················································································································································· 98
Configuring the redirect URL ········································································································································· 99
Setting the EAD rule timer ············································································································································· 99
Displaying and maintaining EAD fast deployment
····································································································· 99
EAD fast deployment configuration example ············································································································ 100
Network requirements········································································································································· 100
Configuration procedure ···································································································································· 101
Verifying the configuration ································································································································· 101
Troubleshooting EAD fast deployment ······················································································································· 102
Web browser users cannot be correctly redirected ························································································ 102
Configuring MAC authentication ··························································································································· 103
Overview······································································································································································· 103
User account policies ·········································································································································· 103
Authentication approaches ································································································································ 103
MAC authentication timers ································································································································· 104
Using MAC authentication with other features ········································································································· 104
VLAN assignment ················································································································································ 104
ACL assignment ··················································································································································· 104
Configuration task list ·················································································································································· 104
Basic configuration for MAC authentication ············································································································· 105
Specifying a MAC authentication domain ················································································································ 106
Displaying and maintaining MAC authentication ···································································································· 106
MAC authentication configuration examples
············································································································ 107
Local MAC authentication configuration example··························································································· 107
RADIUS-based MAC authentication configuration example··········································································· 108
ACL assignment configuration example············································································································ 110
Configuring port security ········································································································································ 113
Overview······································································································································································· 113
Port security features ··········································································································································· 113
Port security modes ············································································································································· 113
Working with guest VLAN and Auth-Fail VLAN ······························································································ 116
Configuration task list ·················································································································································· 116
Enabling port security ·················································································································································· 116
Setting port security's limit on the number of MAC addresses on a port······························································· 117
Setting the port security mode ···································································································································· 117
Configuration prerequisites ································································································································ 118
Configuration procedure ···································································································································· 118
Configuring port security features ······························································································································ 118
Configuring NTK ················································································································································· 118
Configuring intrusion protection ························································································································ 119
Enabling port security traps································································································································ 119
Configuring secure MAC addresses ·························································································································· 120
Configuration prerequisites ································································································································ 121
Configuration procedure ···································································································································· 121
Ignoring authorization information ···························································································································· 122
Displaying and maintaining port security·················································································································· 122
Port security configuration examples ························································································································· 123
Configuring the autoLearn mode ······················································································································· 123
Configuring the userLoginWithOUI mode ········································································································ 125
Configuring the macAddressElseUserLoginSecure mode················································································ 129
Troubleshooting port security ······································································································································ 132
Cannot set the port security mode ····················································································································· 132