HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 4

HP 6125XLG Manual

Page 4 highlights

EAP termination 66 Configuring 802.1X 68 HP implementation of 802.1X 68 Configuration prerequisites 68 802.1X configuration task list 68 Enabling 802.1X 69 Enabling EAP relay or EAP termination 69 Setting the port authorization state 70 Specifying an access control method 70 Setting the maximum number of concurrent 802.1X users on a port 70 Setting the maximum number of authentication request attempts 71 Setting the 802.1X authentication timeout timers 71 Configuring the online user handshake function 72 Configuring the authentication trigger function 72 Configuration guidelines 73 Configuration procedure 73 Specifying a mandatory authentication domain on a port 73 Configuring the quiet timer 74 Enabling the periodic online user re-authentication function 74 Displaying and maintaining 802.1X 75 802.1X authentication configuration example 75 Network requirements 75 Configuration procedure 75 Verifying the configuration 77 Configuring MAC authentication 78 Overview 78 User account policies 78 Authentication methods 78 Configuration prerequisites 79 Configuration task list 79 Enabling MAC authentication 79 Specifying a MAC authentication domain 80 Configuring the user account format 80 Configuring MAC authentication timers 81 Setting the maximum number of concurrent MAC authentication users on a port 81 Displaying and maintaining MAC authentication 82 Local MAC authentication configuration example 82 Network requirements 82 Configuration procedure 82 Verifying the configuration 83 RADIUS-based MAC authentication configuration example 84 Network requirements 84 Configuration procedure 84 Verifying the configuration 85 Configuring port security 87 Overview 87 Port security features 87 Port security modes 87 Configuration task list 90 Enabling port security 90 Setting port security's limit on the number of secure MAC addresses on a port 91 Setting the port security mode 91 Configuring port security features 92 ii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

ii
EAP termination ····················································································································································· 66
Configuring 802.1X ·················································································································································· 68
HP implementation of 802.1X ······································································································································ 68
Configuration prerequisites ··········································································································································· 68
802.1X configuration task list······································································································································· 68
Enabling 802.1X···························································································································································· 69
Enabling EAP relay or EAP termination ······················································································································· 69
Setting the port authorization state ······························································································································ 70
Specifying an access control method ·························································································································· 70
Setting the maximum number of concurrent 802.1X users on a port······································································· 70
Setting the maximum number of authentication request attempts ············································································· 71
Setting the 802.1X authentication timeout timers ······································································································· 71
Configuring the online user handshake function ········································································································ 72
Configuring the authentication trigger function ·········································································································· 72
Configuration guidelines ······································································································································ 73
Configuration procedure ······································································································································ 73
Specifying a mandatory authentication domain on a port························································································ 73
Configuring the quiet timer ··········································································································································· 74
Enabling the periodic online user re-authentication function····················································································· 74
Displaying and maintaining 802.1X ··························································································································· 75
802.1X authentication configuration example ··········································································································· 75
Network requirements··········································································································································· 75
Configuration procedure ······································································································································ 75
Verifying the configuration ··································································································································· 77
Configuring MAC authentication ······························································································································ 78
Overview········································································································································································· 78
User account policies ············································································································································ 78
Authentication methods········································································································································· 78
Configuration prerequisites ··········································································································································· 79
Configuration task list ···················································································································································· 79
Enabling MAC authentication ······································································································································ 79
Specifying a MAC authentication domain ·················································································································· 80
Configuring the user account format···························································································································· 80
Configuring MAC authentication timers ······················································································································ 81
Setting the maximum number of concurrent MAC authentication users on a port·················································· 81
Displaying and maintaining MAC authentication ······································································································ 82
Local MAC authentication configuration example ····································································································· 82
Network requirements··········································································································································· 82
Configuration procedure ······································································································································ 82
Verifying the configuration ··································································································································· 83
RADIUS-based MAC authentication configuration example ····················································································· 84
Network requirements··········································································································································· 84
Configuration procedure ······································································································································ 84
Verifying the configuration ··································································································································· 85
Configuring port security ··········································································································································· 87
Overview········································································································································································· 87
Port security features ············································································································································· 87
Port security modes ··············································································································································· 87
Configuration task list ···················································································································································· 90
Enabling port security ···················································································································································· 90
Setting port security's limit on the number of secure MAC addresses on a port ···················································· 91
Setting the port security mode ······································································································································ 91
Configuring port security features ································································································································ 92