Sign In
Upload
Manuals
Brands
HP Manuals
Network Router
A3100-48 v2
User Manuals: HP A3100-48 v2 Ethernet Switch
Manuals and User Guides for HP A3100-48 v2 Ethernet Switch. We have
2
HP A3100-48 v2 Ethernet Switch manuals available for free PDF download: Security Configuration Manual, Disassembly Instructions
HP A3100-48 v2 Security Configuration Manual (398 pages)
Brand:
HP
| Category:
Network Router
| Size: 5.85 MB
Table of Contents
Configuration Guide
1
Table of Contents
3
AAA Configuration
12
AAA Overview
12
Radius
13
Hwtacacs
18
Domain-Based User Management
20
RADIUS Server Feature of the Switch
21
AAA Across MPLS L3Vpns
22
Protocols and Standards
22
RADIUS Attributes
23
AAA Configuration Considerations and Task List
26
Configuring AAA Schemes
27
Configuring Local Users
27
Configuring RADIUS Schemes
31
Configuring HWTACACS Schemes
44
Configuring AAA Methods for ISP Domains
50
Configuration Prerequisites
50
Creating an ISP Domain
50
Configuring ISP Domain Attributes
51
Configuring AAA Authentication Methods for an ISP Domain
52
Configuring AAA Authorization Methods for an ISP Domain
53
Configuring AAA Accounting Methods for an ISP Domain
55
Tearing down User Connections
56
Configuring a NAS ID-VLAN Binding
57
Specifying the Device ID Used in Stateful Failover Mode
57
Configuring a Switch as a RADIUS Server
58
RADIUS Server Functions Configuration Task List
58
Configuring a RADIUS User
58
Specifying a RADIUS Client
59
Displaying and Maintaining AAA
59
AAA Configuration Examples
60
AAA for Telnet Users by an HWTACACS Server
60
AAA for Telnet Users by Separate Servers
61
Authentication/Authorization for Ssh/Telnet Users by a RADIUS Server
62
AAA for Portal Users by a RADIUS Server
66
AAA for 802.1X Users by a RADIUS Server
75
Level Switching Authentication for Telnet Users by an HWTACACS Server
81
RADIUS Authentication and Authorization for Telnet Users by a Switch
84
Troubleshooting AAA
86
Troubleshooting RADIUS
86
Troubleshooting HWTACACS
87
802.1X Fundamentals
88
802.1X Architecture
88
Controlled/Uncontrolled Port and Port Authorization Status
88
802.1X-Related Protocols
89
Packet Formats
90
EAP over RADIUS
91
Initiating 802.1X Authentication
91
802.1X Client as the Initiator
91
Access Device as the Initiator
92
802.1X Authentication Procedures
92
A Comparison of EAP Relay and EAP Termination
93
EAP Relay
93
EAP Termination
95
802.1X Configuration
96
HP Implementation of 802.1X
96
Access Control Methods
96
Using 802.1X Authentication with Other Features
96
Configuring 802.1X
99
Configuration Prerequisites
99
802.1X Configuration Task List
99
Enabling 802.1X
100
Enabling EAP Relay or EAP Termination
100
Setting the Port Authorization State
101
Specifying an Access Control Method
102
Setting the Maximum Number of Concurrent 802.1X Users on a Port
102
Setting the Maximum Number of Authentication Request Attempts
102
Setting the 802.1X Authentication Timeout Timers
103
Configuring the Online User Handshake Function
103
Configuring the Authentication Trigger Function
104
Specifying a Mandatory Authentication Domain on a Port
105
Configuring the Quiet Timer
105
Enabling the Periodic Online User Re-Authentication Function
106
Configuring an 802.1X Guest VLAN
106
Configuring an Auth-Fail VLAN
108
Specifying Supported Domain Name Delimiters
109
Displaying and Maintaining 802.1X
109
802.1X Configuration Examples
109
802.1X Authentication Configuration Example
109
With Guest VLAN and VLAN Assignment Configuration Example
112
802.1X with ACL Assignment Configuration Example
114
EAD Fast Deployment Configuration
117
EAD Fast Deployment Overview
117
EAD Fast Deployment Implementation
117
Configuring EAD Fast Deployment
117
Configuration Prerequisites
117
Configuration Procedure
117
Displaying and Maintaining EAD Fast Deployment
119
EAD Fast Deployment Configuration Example
119
Troubleshooting EAD Fast Deployment
121
Web Browser Users Cannot be Correctly Redirected
121
MAC Authentication Configuration
122
MAC Authentication Overview
122
User Account Policies
122
Authentication Approaches
122
MAC Authentication Timers
123
Using MAC Authentication with Other Features
123
VLAN Assignment
123
ACL Assignment
123
Guest VLAN
123
MAC Authentication Configuration Task List
124
Basic Configuration for MAC Authentication
124
Configuration Prerequisites
124
Configuration Procedure
124
Specifying an Authentication Domain for MAC Authentication Users
125
Configuring a MAC Authentication Guest VLAN
126
Configuration Prerequisites
126
Configuration Procedure
126
Displaying and Maintaining MAC Authentication
127
MAC Authentication Configuration Examples
127
Local MAC Authentication Configuration Example
127
RADIUS-Based MAC Authentication Configuration Example
129
ACL Assignment Configuration Example
131
Portal Configuration
134
Portal Overview
134
Introduction to Portal
134
Extended Portal Functions
134
Portal System Components
134
Portal System Using the Local Portal Server
136
Portal Authentication Modes
137
Portal Support for EAP
138
Layer 2 Portal Authentication Process
139
Layer 3 Portal Authentication Process
140
Portal Stateful Failover
144
Portal Authentication Across Vpns
145
Portal Configuration Task List
146
Configuration Prerequisites
147
Specifying the Portal Server
147
Specifying the Local Portal Server for Layer 2 Portal Authentication
147
Specifying a Portal Server for Layer 3 Portal Authentication
148
Configuring the Local Portal Server
149
Customizing Authentication Pages
149
Configuring the Local Portal Server
152
Enabling Portal Authentication
152
Enabling Layer 2 Portal Authentication
153
Enabling Layer 3 Portal Authentication
153
Controlling Access of Portal Users
154
Configuring a Portal-Free Rule
154
Configuring an Authentication Source Subnet
155
Setting the Maximum Number of Online Portal Users
155
Specifying an Authentication Domain for Portal Users
156
Configuring Layer 3 Portal Authentication to Support Web Proxy
156
Enabling Support for Portal User Moving
157
Specifying an Auth-Fail VLAN for Portal Authentication
158
Configuring RADIUS Related Attributes
159
Specifying NAS-Port-Type for an Interface
159
Specifying a NAS ID Profile for an Interface
160
Specifying a Source IP Address for Outgoing Portal Packets
160
Configuring Portal Stateful Failover
161
Specifying an Auto Redirection URL for Authenticated Portal Users
163
Configuring Portal Detection Functions
163
Configuring Online Layer 2 Portal User Detection
163
Configuring the Portal Server Detection Function
164
Configuring Portal User Information Synchronization
165
Logging off Portal Users
166
Displaying and Maintaining Portal
166
Portal Configuration Examples
167
Configuring Direct Portal Authentication
167
Configuring Re-DHCP Portal Authentication
172
Configuring Cross-Subnet Portal Authentication
174
Configuring Direct Portal Authentication with Extended Functions
176
Configuring Re-DHCP Portal Authentication with Extended Functions
178
Configuring Cross-Subnet Portal Authentication with Extended Functions
180
Configuring Portal Stateful Failover
182
Configuring Portal Server Detection and Portal User Information Synchronization
190
Configuring Layer 2 Portal Authentication
196
Troubleshooting Portal
199
Inconsistent Keys on the Access Device and the Portal Server
199
Incorrect Server Port Number on the Access Device
200
Triple Authentication Configuration
201
Triple Authentication Overview
201
Triple Authentication Mechanism
201
Using Triple Authentication with Other Features
202
Configuring Triple Authentication
203
Triple Authentication Configuration Examples
203
Triple Authentication Basic Function Configuration Example
203
Triple Authentication Supporting VLAN Assignment and Auth-Fail VLAN Configuration Example
206
Port Security Configuration
211
Port Security Overview
211
Port Security Features
211
Port Security Modes
211
Working with Guest VLAN and Auth-Fail VLAN
214
Port Security Configuration Task List
214
Enabling Port Security
215
Configuration Prerequisites
215
Configuration Procedure
215
Setting Port Security's Limit on the Number of MAC Addresses on a Port
215
Setting the Port Security Mode
216
Configuration Prerequisites
216
Configuration Procedure
216
Configuring Port Security Features
217
Configuring NTK
217
Configuring Intrusion Protection
217
Enabling Port Security Traps
218
Configuring Secure MAC Addresses
219
Configuration Prerequisites
219
Configuration Procedure
220
Ignoring Authorization Information from the Server
220
Displaying and Maintaining Port Security
221
Port Security Configuration Examples
221
Configuring the Autolearn Mode
221
Configuring the Userloginwithoui Mode
224
Configuring the Macaddresselseuserloginsecure Mode
228
Troubleshooting Port Security
231
Cannot Set the Port Security Mode
231
Cannot Configure Secure MAC Addresses
231
Cannot Change Port Security Mode When a User Is Online
231
User Profile Configuration
233
User Profile Overview
233
User Profile Configuration Task List
233
Creating a User Profile
233
Configuration Prerequisites
233
Creating a User Profile
234
Configuring a User Profile
234
Configuration Guidelines
234
Configuration Procedure
234
Enabling a User Profile
235
Displaying and Maintaining User Profiles
235
HABP Configuration
236
HABP Overview
236
Configuring HABP
237
Configuring the HABP Server
237
Configuring an HABP Client
237
Displaying and Maintaining HABP
238
HABP Configuration Example
238
Public Key Configuration
241
Overview
241
Public Key Configuration Task List
241
Configuring a Local Asymmetric Key Pair on the Local Device
242
Creating a Local Asymmetric Key Pair
242
Displaying or Exporting the Local Host Public Key
243
Destroying a Local Asymmetric Key Pair
244
Specifying the Peer Public Key on the Local Device
244
Displaying and Maintaining Public Keys
245
Public Key Configuration Examples
246
Manually Specifying the Peer Public Key on the Local Device
246
Importing a Peer Public Key from a Public Key File
247
PKI Configuration
251
Introduction to PKI
251
PKI Overview
251
PKI Terms
251
PKI Architecture
252
PKI Applications
253
PKI Operation
253
PKI Configuration Task List
253
Configuring an Entity DN
254
Configuring a PKI Domain
255
Submitting a PKI Certificate Request
257
Submitting a Certificate Request in Auto Mode
257
Submitting a Certificate Request in Manual Mode
257
Retrieving a Certificate Manually
258
Configuring PKI Certificate Verification
259
Configuring CRL-Checking-Enabled PKI Certificate Verification
259
Configuring CRL-Checking-Disabled PKI Certificate Verification
260
Destroying a Local RSA Key Pair
260
Deleting a Certificate
261
Configuring an Access Control Policy
261
Displaying and Maintaining PKI
262
PKI Configuration Examples
262
Requesting a Certificate from a CA Server Running RSA Keon
262
Requesting a Certificate from a CA Server Running Windows 2003 Server
265
Configuring a Certificate Attribute-Based Access Control Policy
268
Troubleshooting PKI
270
Failed to Retrieve a CA Certificate
270
Failed to Request a Local Certificate
270
Failed to Retrieve Crls
271
Ipsec Configuration
272
Ipsec Overview
272
Ipsec Implementation
272
Basic Concepts
273
Ipsec for Ipv6 Routing Protocols
275
Protocols and Standards
275
Configuring Ipsec for Ipv6 Routing Protocols
275
Configuring an Ipsec Proposal
275
Configuring an Ipsec Policy
276
Displaying and Maintaining Ipsec
278
Ipsec for Ripng Configuration Example
278
SSH2.0 Configuration
283
SSH2.0 Overview
283
Introduction to SSH2.0
283
SSH Operation
283
SSH Connection Across Vpns
286
Configuring the Switch as an SSH Server
286
SSH Server Configuration Task List
286
Generating a DSA or RSA Key Pair
286
Enabling the SSH Server Function
287
Configuring the User Interfaces for SSH Clients
287
Configuring a Client Public Key
288
Configuring an SSH User
289
Setting the SSH Management Parameters
290
Configuring the Switch as an SSH Client
291
SSH Client Configuration Task List
291
Specifying a Source Ip Address/Interface for the SSH Client
291
Configuring Whether First-Time Authentication Is Supported
292
Establishing a Connection between the SSH Client and Server
292
Displaying and Maintaining SSH
293
SSH Server Configuration Examples
294
When the Switch Acts as a Server for Password Authentication
294
When the Switch Acts as a Server for Publickey Authentication
296
SSH Client Configuration Examples
301
When Switch Acts as Client for Password Authentication
301
When Switch Acts as Client for Publickey Authentication
304
SFTP Configuration
307
SFTP Overview
307
Configuring the Switch as an SFTP Server
307
Configuration Prerequisites
307
Enabling the SFTP Server
307
Configuring the SFTP Connection Idle Timeout Period
307
Configuring the Switch an SFTP Client
308
Specifying a Source Ip Address or Interface for the SFTP Client
308
Establishing a Connection to the SFTP Server
308
Working with SFTP Directories
309
Working with SFTP Files
309
Displaying Help Information
310
Terminating the Connection to the Remote SFTP Server
310
SFTP Client Configuration Example
311
SFTP Server Configuration Example
314
SSL Configuration
317
SSL Overview
317
SSL Security Mechanism
317
SSL Protocol Stack
318
SSL Configuration Task List
318
Configuring an SSL Server Policy
318
Configuration Prerequisites
318
Configuration Procedure
319
SSL Server Policy Configuration Example
320
Configuring an SSL Client Policy
321
Configuration Prerequisites
322
Configuration Procedure
322
Displaying and Maintaining SSL
322
Troubleshooting SSL
323
SSL Handshake Failure
323
TCP Attack Protection Configuration
324
TCP Attack Protection Overview
324
Enabling the SYN Cookie Feature
324
Displaying and Maintaining TCP Attack Protection
325
IP Source Guard Configuration
326
IP Source Guard Overview
326
Static IP Source Guard Binding Entries
326
Dynamic IP Source Guard Binding Entries
327
IP Source Guard Configuration Task List
327
Configuring the Ipv4 Source Guard Function
327
Configuring Ipv4 Source Guard on a Port
327
Configuring a Static Ipv4 Source Guard Binding Entry
328
Setting the Maximum Number of Ipv4 Source Guard Binding Entries
329
Configuring the Ipv6 Source Guard Function
329
Configuring Ipv6 Source Guard on a Port
330
Configuring a Static Ipv6 Source Guard Binding Entry
330
Setting the Maximum Number of Ipv6 Source Guard Binding Entries
331
Displaying and Maintaining IP Source Guard
331
IP Source Guard Configuration Examples
332
Static Ipv4 Source Guard Binding Entry Configuration Example
332
Dynamic Ipv4 Source Guard Binding by DHCP Snooping Configuration Example
334
Dynamic Ipv4 Source Guard Binding by DHCP Relay Configuration Example
335
Static Ipv6 Source Guard Binding Entry Configuration Example
336
Dynamic Ipv6 Source Guard Binding by Dhcpv6 Snooping Configuration Example
337
Dynamic Ipv6 Source Guard Binding by ND Snooping Configuration Example
339
Troubleshooting IP Source Guard
340
Neither Static Binding Entries nor the Dynamic Binding Function Can be Configured
340
ARP Attack Protection Configuration
341
ARP Attack Protection Overview
341
ARP Attack Protection Configuration Task List
341
Configuring ARP Defense against IP Packet Attacks
342
Introduction
342
Configuring ARP Source Suppression
342
Enabling ARP Black Hole Routing
343
Displaying and Maintaining ARP Defense against IP Packet Attacks
343
ARP Defense against IP Packet Attack Configuration Example
343
Configuring ARP Packet Rate Limit
345
Introduction
345
Configuring Source MAC Address Based ARP Attack Detection
346
Introduction
346
Configuration Procedure
346
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
347
Source MAC Address Based ARP Attack Detection Configuration Example
347
Configuring ARP Packet Source MAC Address Consistency Check
348
Introduction
348
Configuration Procedure
348
Configuring ARP Active Acknowledgement
348
Configuration Procedure
349
Configuring ARP Detection
349
Introduction
349
Security Entries/Oui MAC Addresses
349
Configuring ARP Detection Based on Specified Objects
350
Configuring ARP Restricted Forwarding
351
Displaying and Maintaining ARP Detection
351
ARP Detection Configuration Example I
352
ARP Detection Configuration Example II
353
ARP Restricted Forwarding Configuration Example
354
Configuring ARP Automatic Scanning and Fixed ARP
356
Introduction
356
Configuration Procedure
356
Configuring ARP Gateway Protection
357
Introduction
357
Configuration Procedure
357
ARP Gateway Protection Configuration Example
358
Configuring ARP Filtering
359
Introduction
359
Configuration Procedure
359
ARP Filtering Configuration Example
359
ND Attack Defense Configuration
361
Introduction to ND Attack Defense
361
Enabling Source MAC Consistency Check for ND Packets
362
Configuring the ND Detection Function
362
Introduction to ND Detection
362
Configuring ND Detection
363
Displaying and Maintaining ND Detection
363
ND Detection Configuration Example
364
Network Diagram
364
URPF Configuration
366
URPF Overview
366
What Is URPF
366
URPF Check Modes
366
How URPF Works
367
Network Application
370
Configuring URPF
370
URPF Configuration Example
370
MFF Configuration
372
MFF Overview
372
MFF Function
372
Basic Concepts
373
Network Port
373
Operation Modes
373
Working Mechanism
374
Protocols and Standards
374
Configuring MFF
374
Displaying and Maintaining MFF
376
MFF Configuration Examples
376
Auto-Mode MFF Configuration Example in a Tree Network
376
Auto-Mode MFF Configuration Example in a Ring Network
378
Manual-Mode MFF Configuration Example in a Tree Network
380
Manual-Mode MFF Configuration Example in a Ring Network
381
SAVI Configuration
383
SAVI Overview
383
Global SAVI Configuration
383
SAVI Configuration in Dhcpv6-Only Address Assignment Scenario
384
SAVI Configuration in SLAAC-Only Address Assignment Scenario
386
SAVI Configuration in Dhcpv6+Slaac Address Assignment Scenario
388
Blacklist Configuration
391
Blacklist Overview
391
Configuring the Blacklist Feature
391
Displaying and Maintaining the Blacklist
391
Blacklist Configuration Example
392
Network Requirements
392
Verifying the Configuration
392
Support and Other Resources
393
Contacting HP
393
Subscription Service
393
Related Information
393
Documents
393
Websites
393
Conventions
394
Command Conventions
394
Index
396
Advertisement
HP A3100-48 v2 Disassembly Instructions (3 pages)
Brand:
HP
| Category:
Switch
| Size: 0.12 MB
Advertisement
Related Products
HP A-MSR900 Series
HP A-MSR920-W
HP A-MSR20
HP A-MSR30
HP a-msr
HP A8805
HP A8808
HP A6616
HP A6604
HP A6608
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL