HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 5

Logging, Password control configuration task list, iii

Page 5 highlights

Configuring NTK 92 Configuring intrusion protection 93 Configuring secure MAC addresses 94 Configuration prerequisites 94 Configuration procedure 94 Ignoring authorization information from the server 95 Displaying and maintaining port security 95 autoLearn configuration example 96 Network requirements 96 Configuration procedure 96 Verifying the configuration 96 userLoginWithOUI configuration example 97 Network requirements 97 Configuration procedure 98 Verifying the configuration 99 macAddressElseUserLoginSecure configuration example 101 Network requirements 101 Configuration procedure 101 Verifying the configuration 102 Troubleshooting port security 104 Cannot set the port security mode 104 Cannot configure secure MAC addresses 104 Configuring password control 105 Overview 105 Password setting 105 Password updating and expiration 106 User login control 107 Password not displayed in any form 108 Logging 108 FIPS compliance 108 Password control configuration task list 108 Enabling password control 108 Setting global password control parameters 109 Setting user group password control parameters 110 Setting local user password control parameters 110 Setting super password control parameters 111 Displaying and maintaining password control 112 Password control configuration example 112 Managing public keys 115 Overview 115 FIPS compliance 115 Creating a local key pair 116 Configuration guidelines 116 Configuration procedure 116 Distributing a local host public key 117 Exporting a host public key in a specific format to a file 117 Displaying a host public key in a specific format and saving it to a file 117 Displaying a host public key 118 Destroying a local key pair 118 Configuring a peer public key 119 Importing a peer host public key from a public key file 119 Entering a peer public key 119 Displaying and maintaining public keys 120 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

iii
Configuring NTK ··················································································································································· 92
Configuring intrusion protection ·························································································································· 93
Configuring secure MAC addresses ···························································································································· 94
Configuration prerequisites ·································································································································· 94
Configuration procedure ······································································································································ 94
Ignoring authorization information from the server ···································································································· 95
Displaying and maintaining port security···················································································································· 95
autoLearn configuration example ································································································································· 96
Network requirements··········································································································································· 96
Configuration procedure ······································································································································ 96
Verifying the configuration ··································································································································· 96
userLoginWithOUI configuration example ·················································································································· 97
Network requirements··········································································································································· 97
Configuration procedure ······································································································································ 98
Verifying the configuration ··································································································································· 99
macAddressElseUserLoginSecure configuration example ······················································································· 101
Network requirements········································································································································· 101
Configuration procedure ···································································································································· 101
Verifying the configuration ································································································································· 102
Troubleshooting port security ······································································································································ 104
Cannot set the port security mode ····················································································································· 104
Cannot configure secure MAC addresses ········································································································ 104
Configuring password control································································································································ 105
Overview······································································································································································· 105
Password setting ·················································································································································· 105
Password updating and expiration ··················································································································· 106
User login control ················································································································································ 107
Password not displayed in any form ················································································································· 108
Logging
································································································································································· 108
FIPS compliance ··························································································································································· 108
Password control configuration task list
····················································································································· 108
Enabling password control ········································································································································· 108
Setting global password control parameters ············································································································ 109
Setting user group password control parameters ····································································································· 110
Setting local user password control parameters ······································································································· 110
Setting super password control parameters ·············································································································· 111
Displaying and maintaining password control ········································································································· 112
Password control configuration example ·················································································································· 112
Managing public keys ············································································································································ 115
Overview······································································································································································· 115
FIPS compliance ··························································································································································· 115
Creating a local key pair ············································································································································ 116
Configuration guidelines ···································································································································· 116
Configuration procedure ···································································································································· 116
Distributing a local host public key ···························································································································· 117
Exporting a host public key in a specific format to a file················································································ 117
Displaying a host public key in a specific format and saving it to a file ······················································ 117
Displaying a host public key ······························································································································ 118
Destroying a local key pair ········································································································································· 118
Configuring a peer public key···································································································································· 119
Importing a peer host public key from a public key file·················································································· 119
Entering a peer public key ································································································································· 119
Displaying and maintaining public keys ··················································································································· 120