Sign In
Upload
Manuals
Brands
HP Manuals
Switch
ProCurve 4100 Series
HP ProCurve 4100 Series Network Switch Manuals
Manuals and User Guides for HP ProCurve 4100 Series Network Switch. We have
3
HP ProCurve 4100 Series Network Switch manuals available for free PDF download: Function Manual, Access Security Manual, Replacement Instructions
HP ProCurve 4100 Series Function Manual (306 pages)
Access Security Guide ProCurve 2600, 2600-PWR, 2800, 4100, 6108 Series
Brand:
HP
| Category:
Switch
| Size: 2.18 MB
Table of Contents
Access Security Guide
1
Table of Contents
5
Product Documentation
13
About Your Switch Manual Set
13
Feature Index
14
Contents
17
Getting Started
18
Introduction
18
Overview of Access Security Features
18
Management Access Security Protection
19
General Switch Traffic Security Guidelines
20
Conventions
21
Feature Descriptions by Model
21
Command Syntax Statements
21
Command Prompts
22
Screen Simulations
22
Port Identity Examples
22
Sources for more Information
23
Need Only a Quick Start
24
IP Addressing
24
To Set up and Install the Switch in Your Network
25
Contents
27
Configuring Username and Password Security
28
Overview
28
Configuring Local Password Security
30
Menu: Setting Passwords
30
CLI: Setting Passwords and Usernames
31
Web: Setting Passwords and Usernames
32
Front-Panel Security
33
When Security Is Important
33
Front-Panel Button Functions
34
Configuring Front-Panel Security
36
Password Recovery
41
Password Recovery Process
43
Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches
45
Contents
45
Overview
46
Client Options
47
General Features
48
How Web and MAC Authentication Operate
49
Authenticator Operation
49
Terminology
53
Operating Rules and Notes
54
General Setup Procedure for Web/Mac Authentication
56
Do These Steps before You Configure Web/Mac Authentication
56
Additional Information for Configuring the RADIUS Server to Support MAC Authentication
58
Configuring the Switch to Access a RADIUS Server
59
Configuring Web Authentication
61
Overview
61
Configure the Switch for Web-Based Authentication
62
Configuring MAC Authentication on the Switch
66
Overview
66
Configure the Switch for MAC-Based Authentication
67
Show Status and Configuration of Web-Based Authentication
70
Show Status and Configuration of MAC-Based Authentication
71
Show Client Status
73
TACACS+ Authentication
75
Contents
75
Overview
76
Terminology Used in TACACS Applications
77
General System Requirements
79
General Authentication Setup Procedure
79
Configuring TACACS+ on the Switch
82
Before You Begin
82
CLI Commands Described in this Section
83
Viewing the Switch's Current Authentication Configuration
83
Viewing the Switch's Current TACACS+ Server Contact Configuration
84
Configuring the Switch's Authentication Methods
85
Configuring the Switch's TACACS+ Server Access
89
How Authentication Operates
94
General Authentication Process Using a TACACS+ Server
94
Local Authentication Process
96
Using the Encryption Key
97
Controlling Web Browser Interface Access When Using TACACS+ Authentication
98
Controlling Web Browser Interface Access When Using TACACS
98
Authentication
98
Messages Related to TACACS+ Operation
99
Operating Notes
99
RADIUS Authentication and Accounting
101
Contents
101
Overview
102
Terminology
103
Switch Operating Rules for RADIUS
104
General RADIUS Setup Procedure
105
Configuring the Switch for RADIUS Authentication
106
Outline of the Steps for Configuring RADIUS Authentication
107
Configure Authentication for the Access Methods You Want RADIUS
108
To Protect
108
Configure Authentication for the Access Methods You Want
108
Configure the Switch to Access a RADIUS Server
110
Configure the Switch's Global RADIUS Parameters
112
Local Authentication Process
116
Controlling Web Browser Interface Access When Using RADIUS Authentication
117
Configuring RADIUS Accounting
117
Operating Rules for RADIUS Accounting
119
Steps for Configuring RADIUS Accounting
119
Configuring RADIUS Accounting
119
Reports to the Radius Server
122
Viewing RADIUS Statistics
125
General RADIUS Statistics
125
RADIUS Authentication Statistics
127
RADIUS Accounting Statistics
128
Changing RADIUS-Server Access Order
129
Messages Related to RADIUS Operation
131
Configuring Secure Shell (SSH)
133
Contents
133
Overview
134
Terminology
136
Prerequisite for Using SSH
137
Public Key Formats
137
Steps for Configuring and Using SSH for Switch and Client Authentication
138
General Operating Rules and Notes
140
Configuring the Switch for SSH Operation
141
Assign Local Login (Operator) and Enable (Manager) Password
141
Generate the Switch's Public and Private Key Pair
142
Provide the Switch's Public Key to Clients
144
Enable SSH on the Switch and Anticipate SSH Client Contact Behavior
147
Enable SSH on the Switch and Anticipate SSH Client
147
Configure the Switch for SSH Authentication
150
Use an SSH Client to Access the Switch
153
Further Information on SSH Client Public-Key Authentication
153
Messages Related to SSH Operation
159
Configuring Secure Socket Layer (SSL)
161
Contents
161
Overview
162
Terminology
163
Prerequisite for Using SSL
165
Steps for Configuring and Using SSL for Switch and Client Authentication
165
General Operating Rules and Notes
166
Configuring the Switch for SSL Operation
167
Assign Local Login (Operator) and Enable (Manager) Password
167
Generate the Switch's Server Host Certificate
169
Comments on Certificate Fields
171
Enable SSL on the Switch and Anticipate SSL Browser Contact
177
Behavior
181
Common Errors in SSL Setup
181
Configuring Port-Based Access Control (802.1X)
183
Contents
183
Overview
185
Why Use Port-Based Access Control
185
General Features
185
How 802.1X Operates
188
Authenticator Operation
188
Switch-Port Supplicant Operation
189
Terminology
190
General Operating Rules and Notes
192
General Setup Procedure for Port-Based Access Control (802.1X)
194
Do These Steps before You Configure 802.1X Operation
194
Overview: Configuring 802.1X Authentication on the Switch
195
Configuring Switch Ports as 802.1X Authenticators
197
Enable 802.1X Authentication on Selected Ports
197
Configuring Switch Ports as 802.1X Authenticators
201
Configure the 802.1X Authentication Method
201
Enter the RADIUS Host IP Address(Es)
202
Enable 802.1X Authentication on the Switch
202
802.1X Open VLAN Mode
203
Introduction
203
Use Models for 802.1X Open VLAN Modes
204
Operating Rules for Authorized-Client and Unauthorized-Client Vlans
207
Setting up and Configuring 802.1X Open VLAN Mode
209
802.1X Open VLAN Operating Notes
213
Option for Authenticator Ports: Configure Port-Security to Allow Only 802.1X Devices
214
Configuring Switch Ports to Operate as Supplicants for 802.1X Connections to Other Switches
216
Displaying 802.1X Configuration, Statistics, and Counters
220
Show Commands for Port-Access Authenticator
220
Viewing 802.1X Open VLAN Mode Status
222
Show Commands for Port-Access Supplicant
225
How RADIUS/802.1X Authentication Affects VLAN Operation
226
Messages Related to 802.1X Operation
230
Configuring and Monitoring Port Security
231
Contents
231
Overview
232
Basic Operation
232
Blocking Unauthorized Traffic
233
Trunk Group Exclusion
234
Planning Port Security
235
Port Security Command Options and Operation
236
Retention of Static MAC Addresses
240
Displaying Current Port Security Settings
240
Configuring Port Security
242
MAC Lockdown
247
Differences between MAC Lockdown and Port Security
249
Deploying MAC Lockdown
251
MAC Lockout
255
Port Security and MAC Lockout
257
IP Lockdown
258
Web: Displaying and Configuring Port Security Features
259
Reading Intrusion Alerts and Resetting Alert Flags
259
Notice of Security Violations
259
How the Intrusion Log Operates
260
Keeping the Intrusion Log Current by Resetting Alert Flags
261
Using the Event Log to Find Intrusion Alerts
266
Web: Checking for Intrusions, Listing Intrusion Alerts, and Resetting Alert Flags
266
Operating Notes for Port Security
267
Contents
269
Traffic/Security Filters (Procurve Series 2600/2600-PWR and 2800 Switches)
270
Overview
270
Using Source-Port Filters
272
Operating Rules for Source-Port Filters
272
Configuring a Source-Port Filter
273
Viewing a Source-Port Filter
275
Filter Indexing
276
Editing a Source-Port Filter
277
Using Named Source-Port Filters
278
Contents
287
Using Authorized IP Managers
288
Overview
288
Configuration Options
289
Access Levels
289
Defining Authorized Management Stations
290
Overview of IP Mask Operation
290
Menu: Viewing and Configuring IP Authorized Managers
291
CLI: Viewing and Configuring Authorized IP Managers
292
Configuring Ip Authorized Managers for the Switch
293
Web: Configuring IP Authorized Managers
295
Building IP Masks
295
Configuring One Station Per Authorized Manager IP Entry
295
Configuring Multiple Stations Per Authorized Manager IP Entry
296
Additional Examples for Authorizing Multiple Stations
297
Operating Notes
298
Advertisement
HP ProCurve 4100 Series Access Security Manual (241 pages)
Brand:
HP
| Category:
Network Router
| Size: 4.34 MB
Table of Contents
Table of Contents
5
Contents
13
Getting Started
14
Introduction and Applicable Switches
14
About the Feature Descriptions
14
Overview of Access Security Features
15
Command Syntax Conventions
17
Simulating Display Output
17
Command Prompts
17
Screen Simulations
18
Port Identity Convention for Examples
18
Related Publications
18
Getting Documentation from the Web
20
Sources for more Information
21
Need Only a Quick Start
22
To Set up and Install the Switch in Your Network
22
Contents
23
Configuring Username and Password Security
24
Overview
24
Configuring Local Password Security
26
Menu: Setting Passwords
26
CLI: Setting Passwords and Usernames
27
Web: Setting Passwords and Usernames
28
TACACS+ Authentication
29
Contents
29
Overview
30
Terminology Used in TACACS Applications
31
General System Requirements
33
General Authentication Setup Procedure
33
Configuring TACACS+ on the Switch
36
Beforeyou Begin
36
CLI Commands Described in this Section
37
Viewing the Switch's Current Authentication Configuration
37
Viewing the Switch's Current TACACS+ Server Contact
38
Configuration
38
Configuring the Switch's Authentication Methods
39
Configuring the Switch's TACACS+ Server Access
43
How Authentication Operates
48
General Authentication Process Using a TACACS+ Server
48
Local Authentication Process
50
Using the Encryption Key
51
Controlling Web Browser Interface Access When Using TACACS+ Authentication
52
Messages Related to TACACS+ Operation
53
Operating Notes
53
4 RADIUS Authentication and Accounting
55
RADIUS Authentication and Accounting
55
Contents
55
Overview
56
Terminology
57
Switch Operating Rules for RADIUS
58
General RADIUS Setup Procedure
59
Outline of the Steps for Configuring RADIUS Authentication
60
Configuring the Switch for RADIUS Authentication
60
Configure Authentication for the Access Methods You Want
62
RADIUS to Protect
62
Configure the Switch to Access a RADIUS Server
64
Configure the Switch's Global RADIUS Parameters
66
Local Authentication Process
70
RADIUS Authentication
70
Controlling Web Browser Interface Access When Using RADIUS Authentication
71
Configuring RADIUS Accounting
72
Operating Rules for RADIUS Accounting
73
Steps for Configuring RADIUS Accounting
73
Configuring RADIUS Accounting
73
Viewing RADIUS Statistics
79
General RADIUS Statistics
79
RADIUS Authentication Statistics
81
RADIUS Accounting Statistics
82
Changing RADIUS-Server Access Order
83
Messages Related to RADIUS Operation
85
Configuring Secure Shell (SSH)
87
Contents
87
Overview
88
Terminology
90
Prerequisite for Using SSH
91
Public Key Formats
91
Steps for Configuring and Using SSH for Switch and Client
92
Authentication
92
General Operating Rules and Notes
94
Configuring the Switch for SSH Operation
95
Assigning a Local Login (Operator) and Enable (Manager)
95
Password
95
Generating the Switch's Public and Private Key Pair
96
Providing the Switch's Public Key to Clients
98
Enabling SSH on the Switch and Anticipating SSH Client
101
Contact Behavior
101
Configuring the Switch for SSH Authentication
104
Use an SSH Client to Access the Switch
107
Further Information on SSH Client Public-Key Authentication
107
Messages Related to SSH Operation
113
Contents
115
Configuring Secure Socket Layer (SSL)
116
Overview
116
Terminology
117
Prerequisite for Using SSL
119
Steps for Configuring and Using SSL for Switch and Client
119
Authentication
119
General Operating Rules and Notes
120
Configuring the Switch for SSL Operation
121
Assigning a Local Login (Operator) and Enable (Manager)
121
Password
121
Generating the Switch's Server Host Certificate
123
Enabling SSL on the Switch and Anticipating SSL Browser
131
Contact Behavior
131
Common Errors in SSL Setup
135
Configuring Port-Based Access Control (802.1X)
137
Contents
137
Overview
138
Why Use Port-Based Access Control
138
General Features
138
How 802.1X Operates
141
Authenticator Operation
141
Switch-Port Supplicant Operation
142
Terminology
143
General Operating Rules and Notes
145
General Setup Procedure for Port-Based Access Control
147
(802.1X)
147
Do These Steps before You Configure 802.1X Operation
147
Overview: Configuring 802.1X Authentication on the Switch
148
Configuring Switch Ports as 802.1X Authenticators
150
Enable 802.1X Authentication on Selected Ports
150
Configure the 802.1X Authentication Method
154
Enter the RADIUS Host IP Address(Es)
155
Enable 802.1X Authentication on the Switch
155
802.1X Open VLAN Mode
156
Introduction
156
Use Models for 802.1X Open VLAN Modes
157
Operating Rules for Authorized-Client and Unauthorized-Client
160
Vlans
160
Setting up and Configuring 802.1X Open VLAN Mode
162
802.1X Open VLAN Operating Notes
166
Option for Authenticator Ports: Configure Port-Security to Allow Only 802.1X Devices
167
Configuring Switch Ports to Operate as Supplicants for 802.1X Connections to Other Switches
169
Displaying 802.1X Configuration, Statistics, and Counters
173
Show Commands for Port-Access Authenticator
173
Viewing 802.1X Open VLAN Mode Status
175
Show Commands for Port-Access Supplicant
178
How Radius/802.1X Authentication Affects VLAN Operation
179
Messages Related to 802.1X Operation
183
Configuring and Monitoring Port Security
185
Contents
185
Overview
186
Basic Operation
186
Blocking Unauthorized Traffic
187
Trunk Group Exclusion
188
Planning Port Security
189
Port Security Command Options and Operation
190
Displaying Current Port Security Settings
194
Retention of Static MAC Addresses
194
Configuring Port Security
196
Reading Intrusion Alerts and Resetting Alert Flags
201
Notice of Security Violations
201
How the Intrusion Log Operates
202
Keeping the Intrusion Log Current by Resetting Alert Flags
203
Using the Event Log to Find Intrusion Alerts
208
Web: Checking for Intrusions, Listing Intrusion Alerts, and
208
Web: Displaying and Configuring Port Security Features
201
Operating Notes for Port Security
209
Contents
211
Traffic/Security Filters (HP Procurve Switch 2824 and 2848)
212
Overview
212
Using Source-Port Filters
214
Operating Rules for Source-Port Filters
214
Configuring a Source-Port Filter
215
Viewing a Source-Port Filter
217
Filter Indexing
218
Editing a Source-Port Filter
219
Contents
221
Using Authorized IP Managers
222
Overview
222
Options
223
Access Levels
223
Defining Authorized Management Stations
224
Overview of IP Mask Operation
224
Menu: Viewing and Configuring IP Authorized Managers
225
CLI: Viewing and Configuring Authorized IP Managers
226
Web: Configuring IP Authorized Managers
228
Building IP Masks
229
Configuring One Station Per Authorized Manager Ip Entry
229
Configuring Multiple Stations Per Authorized Manager IP Entry
230
Additional Examples for Authorizing Multiple Stations
232
HP ProCurve 4100 Series Replacement Instructions (2 pages)
Switch Fan Tray
Brand:
HP
| Category:
Switch
| Size: 0.12 MB
Advertisement
Advertisement
Related Products
HP ProCurve 6208M-SX
HP ProCurve10Base-T 24
HP procurve switch xl modules
HP Procurve 100
HP ProCurve 2610 Series
HP ProCurve 600
HP ProCurve 610
HP ProCurve 6120 Series
HP ProCurve 3500
HP ProCurve 5406zl Intelligent Edge
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL