HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 266

MAC/802.1X authentication, configuring AAA HWTACACS schemes

Page 266 highlights

802.1X authorization status, 59 802.1X configuration, 68, 68, 75 802.1X controlled/uncontrolled, 59 802.1X mandatory port authentication domain, 73 802.1X max number concurrent users, 70 802.1X overview, 59 MAC authentication configuration, 78, 79 MAC authentication domain specification, 80 MAC authentication enable, 79 MAC authentication max number concurrent port users configuration, 81 MAC local authentication configuration, 82 MAC RADIUS-based authentication configuration, 84 security. See port security port security 802.1X authentication, 89 authentication modes, 87 client macAddressElseUserLoginSecure configuration, 101 client userLoginWithOUI configuration, 97 configuration, 87, 90 displaying, 95 enabling, 90 feature configuration, 92 features, 87 intrusion protection configuration, 93 intrusion protection feature, 87 MAC address autoLearn mode configuration, 96 MAC address learning control, 89 MAC authentication, 89 MAC/802.1X authentication, 89 mode set, 91 NTK configuration, 92 NTK feature, 87 secure MAC address configuration, 94 secure MAC address port limit, 91 server authorization information, 95 troubleshooting, 104 troubleshooting mode cannot be set, 104 troubleshooting secure MAC addresses, 104 power-up self-test, 194 pre-shared key authentication (IKE), 223 procedure applying IPsec policy, 211 authenticating with 802.1X EAP relay, 64 authenticating with 802.1X EAP termination, 66 binding source interface to IPsec policy, 213 configuring 802.1X, 68, 75 configuring 802.1X authentication trigger function, 72 configuring 802.1X online user handshake function, 72 configuring 802.1X quiet timer, 74 configuring AAA, 17 configuring AAA accounting methods for ISP domain, 43 configuring AAA authentication methods for ISP domain, 41 configuring AAA authorization methods for ISP domain, 42 configuring AAA HWTACACS schemes, 30 configuring AAA ISP domain status, 41 configuring AAA LDAP schemes, 37 configuring AAA local user, 18 configuring AAA local user attributes, 19 configuring AAA methods for ISP domain, 40 configuring AAA RADIUS schemes, 22 configuring AAA schemes, 18 configuring AAA user group attributes, 21 configuring ACL for IPsec, 203 configuring ARP active acknowledgement, 177 configuring ARP automatic scanning, 181 configuring ARP detection, 177 configuring ARP filtering, 183, 184 configuring ARP gateway protection, 182, 183 configuring ARP packet rate limit, 173 configuring ARP packet source MAC consistency check, 177 configuring ARP packet validity check, 178 configuring ARP restricted forwarding, 179 configuring ARP source MAC-based attack detection, 174, 175 configuring ARP source suppression, 172 configuring ARP user validity check, 177 configuring ARP user/packet validity check, 180 configuring device as SCP client, 138 configuring device as SFTP client, 135 configuring device as Stelnet client, 132 257

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

257
802.1X authorization status,
59
802.1X configuration,
68
,
68
,
75
802.1X controlled/uncontrolled,
59
802.1X mandatory port authentication
domain,
73
802.1X max number concurrent users,
70
802.1X overview,
59
MAC authentication configuration,
78
,
79
MAC authentication domain specification,
80
MAC authentication enable,
79
MAC authentication max number concurrent
port users configuration,
81
MAC local authentication configuration,
82
MAC RADIUS-based authentication
configuration,
84
security.
See
port security
port security
802.1X authentication,
89
authentication modes,
87
client macAddressElseUserLoginSecure
configuration,
101
client userLoginWithOUI configuration,
97
configuration,
87
,
90
displaying,
95
enabling,
90
feature configuration,
92
features,
87
intrusion protection configuration,
93
intrusion protection feature,
87
MAC address autoLearn mode
configuration,
96
MAC address learning control,
89
MAC authentication,
89
MAC/802.1X authentication,
89
mode set,
91
NTK configuration,
92
NTK feature,
87
secure MAC address configuration,
94
secure MAC address port limit,
91
server authorization information,
95
troubleshooting,
104
troubleshooting mode cannot be set,
104
troubleshooting secure MAC addresses,
104
power-up self-test,
194
pre-shared key authentication (IKE),
223
procedure
applying IPsec policy,
211
authenticating with 802.1X EAP relay,
64
authenticating with 802.1X EAP termination,
66
binding source interface to IPsec policy,
213
configuring 802.1X,
68
,
75
configuring 802.1X authentication trigger
function,
72
configuring 802.1X online user handshake
function,
72
configuring 802.1X quiet timer,
74
configuring AAA,
17
configuring AAA accounting methods for ISP
domain,
43
configuring AAA authentication methods for ISP
domain,
41
configuring AAA authorization methods for ISP
domain,
42
configuring AAA HWTACACS schemes,
30
configuring AAA ISP domain status,
41
configuring AAA LDAP schemes,
37
configuring AAA local user,
18
configuring AAA local user attributes,
19
configuring AAA methods for ISP domain,
40
configuring AAA RADIUS schemes,
22
configuring AAA schemes,
18
configuring AAA user group attributes,
21
configuring ACL for IPsec,
203
configuring ARP active acknowledgement,
177
configuring ARP automatic scanning,
181
configuring ARP detection,
177
configuring ARP filtering,
183
,
184
configuring ARP gateway protection,
182
,
183
configuring ARP packet rate limit,
173
configuring ARP packet source MAC consistency
check,
177
configuring ARP packet validity check,
178
configuring ARP restricted forwarding,
179
configuring ARP source MAC-based attack
detection,
174
,
175
configuring ARP source suppression,
172
configuring ARP user validity check,
177
configuring ARP user/packet validity check,
180
configuring device as SCP client,
138
configuring device as SFTP client,
135
configuring device as Stelnet client,
132