HP 6120G/XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 591
A, aaa authentication, aaa port-access, access, access levels, accounting
View all HP 6120G/XG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 591 highlights
unauthorized-client, caution ... 12-40 unauthorized-client, on different ports ... 12-42 untagged ... 12-33, 12-36, 12-37 untagged membership ... 12-21 VLAN operation ... 12-68 VLAN use, multiple clients ... 12-8 VLAN, assignment conflict ... 5-43, 12-13 VLAN, membership priority ... 12-11, 12-33 VLAN, priority, RADIUS ... 12-37 VLAN, tagged membership ... 12-37 Wake-on-LAN traffic ... 12-28 Web/MAC auth effect ... 12-14 A aaa gvrp-vlans ... 12-74, 12-75 port-access gvrp-vlans ... 12-74, 12-75 aaa authentication ... 4-8 authorized ... 12-25 chap-radius ... 5-11 peap-mschapv2 ... 5-11 privilege-mode ... 4-11 privilege-mode defined ... 4-12 web browser ... 5-11 aaa port-access See Web or MAC authentication. AC CIDR, mask ... 9-42 access methods, determining ... 5-7 access levels authorized IP managers ... 14-3 accounting See RADIUS. ACL ACE sequence ... 9-39 ACE, after match not used ... 9-37 ACE, defined ... 9-7 ACE, duplicates ... 9-39 ACE, limit ... 9-25 ACE, order in list See sequence, ACEs. ACL ID, defined ... 9-8 ACL log message See ACL, logging. ACL mask ... 9-21 ACL, defined ... 9-7 application planning ... 9-17 application, recommended ... 9-4 applied to open connection ... 9-72 assign to VLAN ... 9-38 basic structure ... 9-34 broadcasts, effect on ... 9-72 CIDR, mask ... 9-39 command summary ... 9-6 command syntax ... 9-41 configuration planning ... 9-12 configured but not used ... 9-38 configured, not used ... 9-38 configuring offline ... 9-11 copy operation appends ... 9-65 create, CLI method ... 9-39 DA, defined ... 9-8, 9-9 definitions ... 9-7 deny any, implicit ... 9-11, 9-13, 9-14, 9-16, 9-23, 9-24, 9-25, 9-34, 9-37, 9-38 deny any, implicit, supersede ... 9-34 deny any, implicit, switched packets ... 9-15 deny any, rule use ... 9-18 deny, defined ... 9-8 editing ... 9-39 end ... 9-38 exit statement ... 9-38 extended ACL, resource use ... 9-18 extended, defined ... 9-8, 9-33 extended, numeric I.D. range ... 9-33 extended, structure ... 9-35 extended, use ... 9-10 filtering criteria ... 9-10 filtering process ... 9-14, 9-15, 9-24 host option ... 9-30 i.d. range, 1-99 ... 9-40 implicit deny See deny any, implicit. implicit deny, defined ... 9-8 inbound traffic, defined ... 9-9 logging ... 9-11, 9-12 logging described ... 9-68 logging, ACLs ... 9-42 logging, performance impact ... 9-12 logging, session ... 9-11 managing resource use ... 9-19 mask ... 9-11, 9-28 mask bit overlap ... 9-21 Index - 3