xvii
Configuring Traffic/Security Filters
. . . . . . . . . . . . . . . . . . . . . . . . . . 12-16
Configuring a Source-Port Traffic Filter . . . . . . . . . . . . . . . . . . . . . . 12-17
Example of Creating a Source-Port Filter . . . . . . . . . . . . . . . . . . 12-18
Configuring a Filter on a Port Trunk . . . . . . . . . . . . . . . . . . . . . . 12-18
Editing a Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-19
Configuring a Multicast or Protocol Traffic Filter . . . . . . . . . . . . . . 12-20
Displaying Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22
User-Based Access Control (802.1X)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 13-1
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
802.1X User-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 13-3
802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 13-3
Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 13-4
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4
General 802.1X Authenticator Operation
. . . . . . . . . . . . . . . . . . . . . . 13-8
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 13-8
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-9
General Operating Rules and Notes
. . . . . . . . . . . . . . . . . . . . . . . . . . 13-11
General Setup Procedure for 802.1X Access Control
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 13-13
Overview: Configuring 802.1X Authentication on the Switch . . . . . 13-16
Configuring Switch Ports as 802.1X Authenticators
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 13-18
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......