HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 260

AAA for MPLS L3VPNs, 1X HP MAC-based access control

Page 260 highlights

exchange, 222 keychain, 225 main mode configuration, 232 main mode in phase 1, 222 maintaining, 232 negotiation failure (no proposal or keychain referenced correctly), 236 negotiation failure troubleshooting (no proposal match), 235 negotiation process, 222 PFS, 224 pre-shared key authentication, 223 profile, 225 SA, 200 SA lifetime, 227 security mechanism, 223 troubleshooting, 235 IKE-based IPsec policy configuring by referencing IPsec policy template, 209 direct configuration, 208 IMC RADIUS session-control feature configuration, 44 implementing 802.1X HP MAC-based access control, 68 802.1X HP port-based access control, 68 AAA for MPLS L3VPNs, 13 AAA HWTACACS, 7 AAA LDAP, 9 AAA on device, 11 AAA RADIUS, 2 ACL-based IPsec, 202 IPsec, 201 importing peer host public key from file, 119 public key from file, 122 initiating 802.1X authentication, 62, 63 Internet Key Exchange. See IKE intrusion protection blockmac mode, 93 disableport mode, 93 disableport-temporarily mode, 93 port security feature, 87 IP uRPF configuration, 186, 189, 190 IP addressing ARP attack protection configuration, 171 ARP filtering configuration, 184 ARP gateway protection, 183 ARP user/packet validity check, 180 LDAP server IP address configuration, 37 outgoing RADIUS packet source IP address, 27 RADIUS security policy server IP address configuration, 30 security AAA HWTACACS outgoing packet source IP address, 34 SFTP client source IP address or interface specification, 135 Stelnet client source IP address, 133 IP source guard configuration, 161, 162 displaying, 165 IPv4 configuration, 162 IPv4 dynamic configuration with DHCP relay, 169 IPv4 dynamic configuration with DHCP snooping, 167 IPv4 on interface, 162 IPv4 static configuration, 165 IPv4 static entry on interface, 163 IPv6 configuration, 164 IPv6 on interface, 164 IPv6 static configuration, 170 IPv6 static entry on interface, 164 maintaining, 165 static binding entries, 161 ip validity check (ARP), 178 IPsec ACL-based IPsec, 201 applying IPsec policy, 211 authentication, 200 binding source interface to IPsec policy, 213 configuration, 198 configuring ACL, 203 configuring anti-replay, 212 configuring DF bit of IPsec packets, 214 configuring IKE profile, 225 configuring IKE proposal, 227 configuring IKE-based policy, 207 251

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

251
exchange,
222
keychain,
225
main mode configuration,
232
main mode in phase 1,
222
maintaining,
232
negotiation failure (no proposal or keychain
referenced correctly),
236
negotiation failure troubleshooting (no proposal
match),
235
negotiation process,
222
PFS,
224
pre-shared key authentication,
223
profile,
225
SA,
200
SA lifetime,
227
security mechanism,
223
troubleshooting,
235
IKE-based IPsec policy
configuring by referencing IPsec policy
template,
209
direct configuration,
208
IMC
RADIUS session-control feature
configuration,
44
implementing
802.1X HP MAC-based access control,
68
802.1X HP port-based access control,
68
AAA for MPLS L3VPNs,
13
AAA HWTACACS,
7
AAA LDAP,
9
AAA on device,
11
AAA RADIUS,
2
ACL-based IPsec,
202
IPsec,
201
importing
peer host public key from file,
119
public key from file,
122
initiating
802.1X authentication,
62
,
63
Internet Key Exchange.
See
IKE
intrusion protection
blockmac mode,
93
disableport mode,
93
disableport-temporarily mode,
93
port security feature,
87
IP
uRPF configuration,
186
,
189
,
190
IP addressing
ARP attack protection configuration,
171
ARP filtering configuration,
184
ARP gateway protection,
183
ARP user/packet validity check,
180
LDAP server IP address configuration,
37
outgoing RADIUS packet source IP address,
27
RADIUS security policy server IP address
configuration,
30
security AAA HWTACACS outgoing packet source
IP address,
34
SFTP client source IP address or interface
specification,
135
Stelnet client source IP address,
133
IP source guard
configuration,
161
,
162
displaying,
165
IPv4 configuration,
162
IPv4 dynamic configuration with DHCP relay,
169
IPv4 dynamic configuration with DHCP
snooping,
167
IPv4 on interface,
162
IPv4 static configuration,
165
IPv4 static entry on interface,
163
IPv6 configuration,
164
IPv6 on interface,
164
IPv6 static configuration,
170
IPv6 static entry on interface,
164
maintaining,
165
static binding entries,
161
ip validity check (ARP),
178
IPsec
ACL-based IPsec,
201
applying IPsec policy,
211
authentication,
200
binding source interface to IPsec policy,
213
configuration,
198
configuring ACL,
203
configuring anti-replay,
212
configuring DF bit of IPsec packets,
214
configuring IKE profile,
225
configuring IKE proposal,
227
configuring IKE-based policy,
207