18 – Index
configuration, encryption key … 5-22
configuration, server access … 5-17
configuration, timeout … 5-23
configuration, viewing … 5-9
encryption key … 5-5, 5-17, 5-18, 5-22
encryption key exclusion … 5-30
encryption key, general operation … 5-26
encryption key, global … 5-23
encryption key, saving to configuration
general operation … 5-1
IP address, server … 5-17
local manager password requirement … 5-30
messages … 5-29
NAS … 5-2
precautions … 5-4
preparing to configure … 5-7
preventing switch lockout … 5-17
privilege level code … 5-6
server access … 5-17
server priority … 5-21
setup, general … 5-4
shared secret key, saving to configuration
show authentication … 5-7
single login … 5-13
single sign-on … 5-13
system requirements … 5-4
server … 5-2, 5-7
testing … 5-4
TFTP, configuration … 5-30
timeout … 5-17
troubleshooting … 5-5
unauthorized access, preventing … 5-6
web access, controlling … 5-28
web access, no effect on … 5-4
tacacs
key string with tilde character … 5-20
TCP
TCP control bits
TCP/UDP
monitoring packets to closed ports … 11-33
TLS
RADIUS.
troubleshooting
authentication via Telnet … 5-17
authorized IP managers … 15-14
trunk
filter, source-port … 12-2, 12-18
LACP, 802.1X not allowed … 13-18
port added or removed, ACL … 10-34
LACP.
trusted port
defined … 11-17
enabling … 11-17
trusted ports
U
untrusted policy, snooping
USB
user name
cleared … 2-5
SNMP configuration … 2-1
V
vendor-specific attribute
configured in RADIUS server … 7-3
configuring … 7-3
configuring support for HP VSAs … 6-39
defined … 7-14
defining … 6-40
virus detection
monitoring ARP requests … 11-33
virus-throttling
connection-rate filtering.
VLAN
802.1X … 13-69
802.1X, ID changes … 13-72, 13-76
802.1X, suspend untagged VLAN … 13-65
connection-rate filtering … 3-18
dynamic … 10-34
guest access … 13-29
not advertised for GVRP … 13-72, 13-76
port-access mixed … 13-29
Tagged egress VLAN in authentication
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......