8 – Index
ACE mask … 3-24
application to port … 3-19
applying … 3-24
CIDR notation … 3-24
configuring … 3-17
example … 3-25, 3-26
filter … 3-18, 3-20, 3-21, 3-28
ignore … 3-18, 3-20, 3-21, 3-27
implicit filter … 3-18, 3-28
operation … 3-18
source IP … 3-19
UDP/TCP … 3-21
UDP/TCP options … 3-22
UDP/TCP port data … 3-23
VLAN effect … 3-18
activation … 3-3, 3-6
benefits … 3-2
block … 3-11
blocked host … 3-4, 3-6, 3-15, 3-16
blocked host, re-enable … 3-4, 3-8
configuration, example … 3-13
configuring per-port … 3-11
edge of network … 3-1
enabling, commands … 3-10
event log notice … 3-4
exception for, configuring … 10-21
false positive … 3-4
guidelines … 3-7, 3-8
high rate, legitimate … 3-16
host, trusted … 3-16
host, unblocking … 3-16
ICMP ping message … 3-1
IPv6 not supported … 3-6
notify and reduce … 3-4
notify only … 3-4
notify-only … 3-11
operating rules … 3-6
operation … 3-3
options … 3-3
penalty period, throttling … 3-11
port setting change, effect … 3-6
reboot, effect … 3-6
recommended application … 3-1
re-enable blocked host … 3-6
routed traffic … 3-9
sensitivity level … 3-4, 3-7
sensitivity level, changing … 3-16
sensitivity level, command … 3-10
show, command … 3-14, 3-15
signature recognition … 3-1, 3-2
SNMP trap … 3-4
throttle … 3-4, 3-5, 3-11
trigger … 3-3, 3-6, 3-9
unblock command … 3-8, 3-16
unblocking a host … 3-6
VLAN delete, effect … 3-6
worm … 3-1, 3-2
console
authorized IP managers, configuring … 15-5
control bits, TCP
CoS
configuring for a RADIUS server … 7-1
override … 7-3, 13-64
priority assignment … 6-2
RADIUS client … 7-8
viewing per-port config … 7-7
crypto
babble … 8-11
fingerprint … 8-11
D
DA, defined
debug logging
default configuration and security
default settings
802.1X
access control,
none
aaa authentication parameters … 5-12
aaa port-access mac-based … 4-52–4-53
aaa port-access web-based … 4-22–4-25
ACLs,
none
authorized ip managers,
none
cached-reauth-limit, no limit … 6-27
client public-key authentication,
disabled
connection-rate filtering … 3-1
connection-rate filtering,
none
DHCP snooping
database parameters … 11-11
on VLANs,
disabled
Option 82 remote-id,
MAC address
Option 82 untrusted-policy,
drop
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......