Index – 1
Index
Numerics
3DES
802.1X
ACL, effect on … 10-18
cached reauthentication … 6-26
802.1X access control
authenticate users … 13-3
authentication
local … 13-4
methods … 13-2
user-based … 13-3
backend state … 13-64
operation … 13-8
show commands … 13-55
state … 13-64
unblock port … 13-4
authorized-client VLAN, defined … 13-5
auth-vid … 13-23
auto … 13-21
blocked port, trunked … 13-12
caution, unauthorized-client VLAN … 13-40
CHAP … 13-2
chap-radius … 13-24
clear-statistics … 13-27
client, effect of disconnect … 13-40
client-limit, no … 13-20
configure
commands … 13-17
displaying configuration … 13-55
overview … 13-16
port … 13-18
configuring method … 13-24
control all clients … 13-11
control command … 13-21
convert to port-based … 13-20
CoS override … 13-64
counters … 13-55
delay move to unauthorized-client
delay Unauth-Client VLAN … 13-23
DHCP server … 13-41
display all 802.1X, Web, and MAC authentication
displaying 802.1X port configuration … 13-57,
EAP … 13-2
EAPOL … 13-5, 13-59
eap-radius … 13-24
enabling
controlled directions … 13-27
on ports … 13-18
on switch … 13-26
features … 13-1
force authorized … 13-21, 13-65
force unauthorized … 13-21, 13-65
general setup … 13-13
guest VLAN … 13-5, 13-6, 13-32, 13-39
GVRP … 13-69, 13-71
hierarchy of precedence in authentication
initialize … 13-27
local … 13-24
logoff-period … 13-23
max-requests … 13-22
MD5 … 13-5, 13-52
meshing, not supported … 13-12
multiple clients … 13-40
multiple clients, same VLAN … 13-3
open port … 13-2
open VLAN
authorized client … 13-34
configuration … 13-44, 13-47
general operation … 13-32
mode … 13-32, 13-38
operating notes … 13-48
operating rules … 13-39
PVID, no … 13-64
security breach … 13-48
set up … 13-43
status … 13-58, 13-65
status, viewing … 13-64
suspended VLAN … 13-65
unauthorized client … 13-34
use model … 13-33
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......